FrostyNeighbor, a long-running cyberespionage actor apparently aligned with the interests of Belarus, has been active recently in campaigns targeting governmental organizations in Ukraine.This latest ...
Guidance stance stayed consistent: in Q4 2025, management said it "anticipate 2026 revenues to grow consistent with our 20% long-term growth target" and in Q1 2026 Kibarian said the company "reconfirm ...
PDF Guru, a global leader in document management, today announced the public release of its AI Image Enhancer. This high-fidelity restoration suite, ...
Adobe patches a critical PDF flaw exploited for months, allowing attackers to bypass sandbox protections and deliver malware. Users urged to update now.
# make-pdf-javascript, use it to create a PDF document with embedded JavaScript that will execute automatically when the document is opened """make-pdf-javascript, use it to create a PDF document with ...
Adobe has released emergency updates to fix a critical security flaw in Acrobat Reader that has come under active exploitation in the wild. The vulnerability, assigned the CVE identifier ...
Abstract: The Portable Document Format (PDF) is widely used for information exchange but is also a common attack vector. Its complexity and customizability make it vulnerable to exploitation, allowing ...
As part of the 'DOOM Challenge' to install the FPS 'DOOM' on everything, 'DoomPDF', which ported DOOM to a PDF file, appeared in January 2025. DoomPDF uses the PDF JavaScript environment to represent ...
The jsPDF library for generating PDF documents in JavaScript applications is vulnerable to a critical vulnerability that allows an attacker to steal sensitive data from the local filesystem by ...
Another popular PDF reader for Windows 11 that we have on the list is the Foxit PDF reader. The software is compatible with Windows, macOS, iOS, and all the other operating systems. With this software ...
A new phishing and malware distribution toolkit called MatrixPDF allows attackers to convert ordinary PDF files into interactive lures that bypass email security and redirect victims to credential ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results