Adobe releases fix for actively exploited Flash Player zero-day

If you’re still using Flash Player, it’s time to update it again – and quickly: Adobe has just patched a critical zero day vulnerability (CVE-2018-5002) actively exploited in the wild. The attacks are “limited, targeted attacks … Continue reading Adobe releases fix for actively exploited Flash Player zero-day

Flash zero-day shows up in Qatar amid geopolitical struggles

A zero-day vulnerability in Adobe Flash was recently used to infect a likely diplomatic target in Qatar with malware, new research from Seattle-based cybersecurity company ICEBRG and Chinese tech firms Qihoo and Tencent shows. Adobe patched the vulnerability Thursday as part of a broader software update in a release that credited Seattle-based cybersecurity firm ICEBRG for alerting them to the flaw. The findings come as Qatar faces significant geopolitical struggles, including a trade blockade established by the United Arab Emirates (UAE), Saudi Arabia, Bahrain and Egypt. Over the last six months, politically-motivated Middle Eastern hacking has popped up numerous times. In late May, Qatar was outed as being connected to a hacking operation against top Republican donor Elliot Brody, an influential critic of the gulf state. Months earlier, Qater blamed UAE for hacking and editing content hosted by the Qatari News Agency (QNA), a government-backed news program. Subsequent reporting tied the QNA hack […]

The post Flash zero-day shows up in Qatar amid geopolitical struggles appeared first on Cyberscoop.

Continue reading Flash zero-day shows up in Qatar amid geopolitical struggles

A week in security (May 22 – May 28)

Last week we informed you about several new threats, here is a roundup of our posts and other noteworthy cybersecurity news.

Categories:

Tags:

(Read more…)

The post A week in security (May 22 – May 28) appeared first on Malwarebytes Labs.

Continue reading A week in security (May 22 – May 28)

Under tough surveillance, China’s cybercriminals find creative ways to chat

Think of it as hiding in plain sight. Ninety-nine percent of Chinese cybercriminals communicate over instant messenger apps like QQ and WeChat, according to research from the cybersecurity firm Flashpoint. Both apps are wildly popular in China and almost nowhere else. The apps, which are both owned and operated by the multibillion-dollar Chinese tech giant Tencent, cooperate directly and extensively with expansive government censorship and surveillance. To the outside, it would seem to be a barren and dangerous environment for coordinating criminal enterprises. That doesn’t stop the hackers, though. “You would imagine that people who are engaging in illicit activities would at least make an effort to use a platform that’s not explicitly monitored by the regime, right?” says Jon Condra, Flashpoint’s Director of East Asian Research and Analysis. To beat government surveillance, China’s cybercriminal underground deploy technical, typographic and linguistic tricks that can make tracking them increasingly difficult. In Russia, by stark contrast, Jabber reigns as the messenger […]

The post Under tough surveillance, China’s cybercriminals find creative ways to chat appeared first on Cyberscoop.

Continue reading Under tough surveillance, China’s cybercriminals find creative ways to chat

Tencent to open AI research center in Seattle

 Chinese tech conglomerate Tencent will be opening a new AI research center in Seattle, according to The Information. The company has long had a core office in Palo Alto, but this will be its first major machine intelligence R&D effort in the country. Earlier this week Tencent announced that it would open its first data center in Silicon Valley.  Yu Dong, formally of Microsoft Research,… Read More Continue reading Tencent to open AI research center in Seattle