Results for 'adobe reader'

Exploits and vulnerabilities | News | Threats

Adobe Reader zero-day discovered alongside Windows vulnerability

May 15, 2018 - During the first half of 2018, we have witnessed some particularly interesting zero-day exploits, including one for Flash (CVE-2018-4878) and more recently...

CONTINUE READING
Cybercrime | News | Scams

Adobe Phish Back in the Wild

January 15, 2015 - We recently found a compromised site serving what appears to be an Adobe phish. Like most phishing campaigns, this one may have...

CONTINUE READING
Cybercrime | News

Adobe compromised, announces breach

October 4, 2013 - Looks like Adobe, makers of products as Photoshop and Adobe Reader, has suffered a major compromise. Brian Krebs, of Krebs On Security...

CONTINUE READING
Cybercrime | News

CTA: New Adobe Zero-Day

February 14, 2013 - URGENT: A few days ago a new zero-day vulnerability in Adobe Reader had surfaced.  Details below are on Adobe’s blog.

CONTINUE READING
MALWARE

Neutrino

Short bio The Neutrino exploit kit is a malicious tool kit, which can be used by attackers who are not experts...

CONTINUE READING
MALWARE

Exploit kits

Short bio An exploit kit is a toolkit designed to facilitate the exploitation of client-side vulnerabilities most commonly found in browsers...

CONTINUE READING
EXPLOIT KITS

Angler

Short bio Angler was one of the leading exploit kits used by cybercriminals to distribute malware ranging from ransomware and banking...

CONTINUE READING
News

A week in security (August 26 – September 1)

September 3, 2019 - Last week on Malwarebytes Labs, we analysed the Android xHelper trojan, we wondered why the Nextdoor app would send out letters...

CONTINUE READING
News

A week in security (May 14 – May 20)

May 21, 2018 - Last week, we looked at the deluge of incoming policies caused by GDPR, tackled Adobe Reader zero days, and ran through...

CONTINUE READING
Explained | News

What are exploits? (And why you should care)

March 29, 2017 - Exploits: they’re not your mama’s cyberthreats. At one point in the not-so-distant past, exploits were responsible for delivering 80 percent of...

CONTINUE READING