Adobe Reader zero-day exploited since Dec 2025 via malicious PDFs, enabling data theft and potential RCE, prompting urgent ...
Hackers have been quietly exploiting what appears to be a zero-day in Adobe Acrobat Reader for months, using booby-trapped PDFs to profile targets and decide who's worth fully compromising.
Phishing surge, LinkedIn tracking claims, spyware use, and rising stealers expose growing abuse of trusted systems.
A convincing Microsoft lookalike tricks users into downloading malware that steals passwords, payments, and account access.
Negotiators had reached agreement on key issues despite Trump team’s idiosyncratic approach. Two days later, war began In the many bizarre exchanges that occurred in the run-up to the US-Israeli ...
North Korean hackers used an updated version of a known backdoor to target a popular npm package.
Infosecurity outlines key recommendations for CISOs and security teams to implement safeguards for AI-assisted coding ...
Within days of each other, Anthropic first leaked the source code to Claude Code, and then a critical vulnerability was found ...
The popular JavaScript HTTP client Axios has been compromised in a supply chain attack, exposing projects to malware through ...
A critical supply chain attack has compromised the popular JavaScript library axios, leading to developers unknowingly ...
How can an extension change hands with no oversight?