Adobe Reader zero-day exploited since Dec 2025 via malicious PDFs, enabling data theft and potential RCE, prompting urgent ...
Hackers have been quietly exploiting what appears to be a zero-day in Adobe Acrobat Reader for months, using booby-trapped PDFs to profile targets and decide who's worth fully compromising.
Today, threat actors are quietly collecting data, waiting for the day when that information can be cracked with future ...
A convincing Microsoft lookalike tricks users into downloading malware that steals passwords, payments, and account access.
Infosecurity outlines key recommendations for CISOs and security teams to implement safeguards for AI-assisted coding ...
North Korean hackers used an updated version of a known backdoor to target a popular npm package.
Within days of each other, Anthropic first leaked the source code to Claude Code, and then a critical vulnerability was found ...
Threat actors hijacked the popular npm package axios to spread RAT malware after compromising an open‑source maintainer’s ...
The popular JavaScript HTTP client Axios has been compromised in a supply chain attack, exposing projects to malware through ...
Threat actors are exploiting the recent Claude Code source code leak by using fake GitHub repositories to deliver Vidar ...
DeepLoad exploits ClickFix and WMI persistence to steal credentials, enabling stealth reinfection after three days.
Researchers say they’ve discovered a supply-chain attack flooding repositories with malicious packages that contain invisible ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results