• Home
  • Web Security
  • Uncategorized
  • Vulnerabilities
  • Microsoft
  • ransomware
Log In
February 21, 2019

User Panel Banner
Log In

  • Home
  • Web Security
  • Uncategorized
  • Vulnerabilities
  • Microsoft
  • ransomware
HomeWeb SecurityAdobe Flash Responsible For Six of the Top 10 Bugs...

Adobe Flash Responsible For Six of the Top 10 Bugs Used By Exploit Kits In 2016

  • December 8, 2016
  • 0 comments
  • Simon Steed
  • Posted in Web Security
  • 0
0
SHARES
ShareTweet

Trailrunner7 quotes a report from On the Wire: Vulnerabilities in Flash and Internet Explorer dominated the exploit kit landscape in the last year, with a high-profile bug in Flash being found in seven separate kits, new research shows. Exploit kits have long been a key tool in the arsenal of many attackers, from low-level gangs to highly organized cybercrime crews. Their attraction stems from their ease of use and the ability for attackers to add exploits for new vulnerabilities as needed. While there are dozens of exploit kits available, a handful of them attract the most use and attention, including Angler, Neutrino, Nuclear, and Rig. Researchers at Recorded Future looked at more than 140 exploit kits and analyzed which exploits appeared in the most kits in the last year, and it’s no surprise that Flash and IE exploits dominated the landscape. Six of the top 10 most-refquently targeted vulnerabilities in the last year were in Flash, while the other four were in Microsoft products, including IE, Windows, and Silverlight. Flash has been a favorite target for attackers for a long time, for two main reasons: it’s deployed on hundreds of millions of machines, and it has plenty of vulnerabilities. Recorded Future’s analysis shows that trend is continuing, and one Flash bug disclosed October 2015 was incorporated into seven individual exploit kits. The flaw was used by a number of high-level attackers, including some APT groups. “Adobe Flash Player’s CVE-2015-7645, number 10 in terms of references to exploit kits, stands out as the vulnerability with the most adoption by exploit kits. Exploit kits adopting the Adobe bug in the past year include Neutrino, Angler, Magnitude, RIG, Nuclear Pack, Spartan, and Hunter,” the analysis by Recorded Future says.


Share on Google+

Read more of this story at Slashdot.

Share this

ShareTweet

Related Posts

0 comments
PrivacyWeb Security

Health trust rapped on illegal use of patient data in Google AI deal

0 comments
UncategorizedWeb Security

GDPR: who needs to hire a data protection officer?

0 comments
DDoSPrivacyUncategorizedWeb Security

News in brief: China tightens Great Firewall; student charged over DDoS attacks; health data posted online

Paris Makes All Public Transportation Free In Batt...

  • December 8, 2016
  • 0 comments

Apple Is In Talks With Hollywood For Early Access ...

  • December 8, 2016
  • 0 comments

Share this

0
SHARES
ShareTweet

About author

Simon Steed

Related Posts

0 comments
PrivacyWeb Security

Health trust rapped on illegal use of patient data in Google AI deal

0 comments
UncategorizedWeb Security

GDPR: who needs to hire a data protection officer?

0 comments
DDoSPrivacyUncategorizedWeb Security

News in brief: China tightens Great Firewall; student charged over DDoS attacks; health data posted online

0 comments
Web Security

Now Any Florida Resident Can Challenge What Is Taught In Public Florida Schools

Tags

  • IT
  • security
  • threats

Leave a Reply Cancel reply

Do not miss

0 comments
PrivacyWeb Security

Health trust rapped on illegal use of patient data in Google AI deal

Pages

  • A List Of Rules That Every C Programmer Should Follow
  • A tutorial on I/O Streams
  • A TUTORIAL ON POINTERS AND ARRAYS IN C
  • An Assembly Language Primer(C) 1983 by David Whitman
  • C Frequently Asked Questions (FAQ) Full Version
  • C/C++ Null Pointers
  • C++ Operators by John M. Dlugosz
  • C++ Overview by John Tal
  • comp.lang.c Answers to Frequently Asked Questions (FAQ List)
  • Delphi Tips
  • Delphi Tutorial – Lesson 1 12/29/98 Frank Fortino [email protected] Copyright 1999
  • Delphi Tutorial – Lesson 2 More Delphi Stuff 1/4/99 Frank Fortino [email protected] Copyright 1999
  • General Steps in Converting C applications to C++
  • Home
  • How to do things in Visual Basic
  • IBM Personal Computer Assembly Language Tutorial
  • LocalSQL.hlp as HTML File
  • Programming in C – a shortish tutorial by Toto
  • Sample Page
  • Using the Debug Command (dos)
  • Write simple scripts in PERL (CGI)

Top Posts

Health trust rapped on illegal use of patient data...

  • July 5, 2017
  • 0

GDPR: who needs to hire a data protection officer?

  • July 5, 2017
  • 0

News in brief: China tightens Great Firewall; stud...

  • July 5, 2017
  • 0

Now Any Florida Resident Can Challenge What Is Tau...

  • July 4, 2017
  • 0

Court Blocks EPA Effort To Suspend Obama-Era Metha...

  • July 4, 2017
  • 0

Tags

IT security threats

Archive

Site Categories

Copyright © 2006-2016 xploiter.com
Got a hot tip? Send it to us!

Your Name (required)

Your Email (required)

Video URL

Attach Video

Category
SportNewsTechMusic

Your Message

Got a hot tip? Send it to us!

Your Name (required)

Your Email (required)

Subject

Your Message