Skip to content
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap
GeekWire
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap

PDFs

It’s 2022 and there are still malware-laden PDFs in emails exploiting bugs from 2017

24 May 2022

HP’s cybersecurity folks have uncovered an email campaign that ticks all the boxes: messages with a PDF attached that embeds a Word …

Tags IT, News, PDFs

Snake Keylogger Spreads Through Malicious PDFs

23 May 2022

While most malicious e-mail campaigns use Word documents to hide and spread malware, a recently discovered campaign uses a malicious PDF …

Tags Keyloggers, Malicious, Malware, PDFs, Snakes

Researchers find 134 flaws in the way Word, PDFs, handle scripts

13 May 2022

Security researchers have devised a tool that detects flaws in the way apps like Microsoft Word and Adobe Acrobat process JavaScript, and …

Tags IT, News, PDFs, Researchers, Words

Malicious PDFs Flood the Web, Lead to Password-Snarfing

15 June 2021

The pushers behind the SolarMarker backdoor malware are flooding the web with PDFs stuffed with keywords and links that redirect to the …

Tags Flood, Leads, Malicious, Malware, PDFs

Falsifying and weaponizing certified PDFs

27 May 2021

The Portable Document Format (PDF) file type is one of the most common file formats in use today. It’s value comes from the fact that …

Tags IT, News, PDFs

Foxit Reader Vulnerability Let Hackers Run Malicious Code via PDFs

11 May 2021

Aleksander Nikolic, the security expert of Cisco Talos has recently detected a vulnerability that is continuously targeting the “Foxit …

Tags Foxit, Hacking, Let, PDFs, Readers

YIKES! Hackers flood the web with 100,000 pages offering malicious PDFs

15 April 2021

Cybercriminals are resorting to search engine poisoning techniques to lure business professionals into seemingly legitimate Google sites …

Tags Cyber Threats, Hacking, IT, News, PDFs

Shadow Attacks Let Attackers Replace Content in Digitally Signed PDFs

23 February 2021

Researchers have demonstrated a novel class of attacks that could allow a bad actor to potentially circumvent existing countermeasures and …

Tags Attackers, Attacks, Contents, Let, PDFs
Cookie-Free

NVD

  • CVE-2022-31104 – Wasmtime is a standalone runtime for WebAssembly. In affected versions wasmtime’s implemen …28 June 2022
  • CVE-2022-34132 – Benjamin BALET Jorani v1.0 was discovered to contain a SQL injection vulnerability via the …28 June 2022
  • CVE-2022-34133 – Benjamin BALET Jorani v1.0 was discovered to contain a cross-site scripting (XSS) vulnerab …28 June 2022
  • CVE-2022-34134 – Benjamin BALET Jorani v1.0 was discovered to contain a Cross-Site Request Forgery (CSRF) v …28 June 2022
  • CVE-2022-1321 – The miniOrange’s Google Authenticator WordPress plugin before 5.5.6 does not sanitise and …27 June 2022
  • CVE-2022-1846 – The Tiny Contact Form WordPress plugin through 0.7 does not have CSRF check in place when …27 June 2022

EXPLOITS

  • Mailhog 1.0.1 – Stored Cross-Site Scripting (XSS)28 June 2022
  • WSO2 Management Console (Multiple Products) – Unauthenticated Reflected Cross-Site Scripting (XSS)28 June 2022
  • WordPress Plugin Weblizar 8.9 – Backdoor28 June 2022
  • Algo 8028 Control Panel – Remote Code Execution (RCE) (Authenticated)14 June 2022
  • HP LaserJet Professional M1210 MFP Series Receive Fax Service – Unquoted Service Path14 June 2022
  • Virtua Software Cobranca 12S – SQLi14 June 2022

SECURELIST

  • The hateful eight: Kaspersky’s guide to modern ransomware groups’ TTPs23 June 2022
  • APT ToddyCat21 June 2022
  • ‘Unpacking’ technical attribution and challenges for ensuring stability in cyb20 June 2022
  • How much does access to corporate infrastructure cost?15 June 2022
  • Router security in 20218 June 2022
  • CVE-2022-30190 (Follina) vulnerability in MSDT: description and counteraction6 June 2022

Information Cyber Network Enterprise Security News

Copyright © 2022 GeekWire | Cookie-Free | Privacy Policy | We are not responsible for the content of external sites.

GeekWire Information Cyber Network Enterprise Security News