Hackers have been quietly exploiting what appears to be a zero-day in Adobe Acrobat Reader for months, using booby-trapped PDFs to profile targets and decide who's worth fully compromising.
Adobe Reader zero-day exploited since Dec 2025 via malicious PDFs, enabling data theft and potential RCE, prompting urgent ...
Players should take "appropriate security measures to ensure their system is safe. Simply uninstalling the mods is not ...
Within days of each other, Anthropic first leaked the source code to Claude Code, and then a critical vulnerability was found ...
A North Korea-nexus threat actor compromised the widely used axios npm package, delivering a cross-platform remote access ...
A supply chain compromise involving the widely used JavaScript package Axios is now being tied to a North Korea-linked threat actor, turning what already looked like a serious open-source incident ...
Google links Axios npm supply chain attack to UNC1069 after trojanized versions 1.14.1 and 0.30.4 spread WAVESHAPER.V2, ...
After details of a yet-to-be-announced model were revealed due to the company leaving unpublished drafts of documents and ...
The malware, known as Phantom Stealer, collects browser credentials, cookies, saved passwords, autofill data and payment card ...
Hackers hijacked the npm account of the Axios package, a JavaScript HTTP client with 100M+ weekly downloads, to deliver ...
ThreatDown Uncovers First Cyber Attack Abusing Deno JavaScript Runtime for Fileless Malware Delivery
ThreatDown, the corporate business unit of Malwarebytes, today published research documenting what researchers believe to be ...
Abstract: Software piracy is a major problem faced in the software industry. Despite the several techniques proposed in previous studies, software piracy and intellectual property theft have continued ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results