Tag: zero-day
-
Crushing the Axios supply chain threat with Tenable Hexa AI: Use cases for agentic AI
Tags: ai, attack, business, credentials, crypto, cve, data, data-breach, malicious, moveIT, network, okta, radius, risk, software, supply-chain, threat, update, vulnerability, zero-daySee how you can use Tenable Hexa AI to determine in minutes if you’re impacted by the Axios npm supply chain attack. Learn how easy it is to automate configuration of scans, identify impacted assets, prioritize remediation, and more using agentic AI from Tenable. Key takeaways: Tenable Hexa AI, the agentic engine of the Tenable…
-
Can Anthropic Keep Its Exploit-Writing AI Out of the Wrong Hands?
Its Mythos Preview model, which can allegedly find and exploit critical zero-days, also comes with certain controls, the vendor said. First seen on darkreading.com Jump to article: www.darkreading.com/application-security/anthropic-exploit-writing-mythos-ai-safe
-
‘BlueHammer’ Windows Zero-Day Exploit Signals Microsoft Bug Disclosure Issues
Under the alias ‘Chaotic Eclipse,’ a researcher released a PoC exploit for a zero-day flaw that allows for system takeover by a local user, citing an undisclosed beef with Microsoft. First seen on darkreading.com Jump to article: www.darkreading.com/vulnerabilities-threats/bluehammer-windows-exploit-microsoft-bug-disclosure-issues
-
Malicious PDF reveals active Adobe Reader zero-day in the wild
Hackers used an Adobe Reader zero-day for months. Researcher Haifei Li found a malicious PDF and asks the community to help analyze it. Hackers used an Adobe Reader zero-day for months to deliver a sophisticated PDF exploit. Cybersecurity researcher Haifei Li, founder of Expmon, discovered the malicious file and warned the community. On March 26,…
-
Bug Management in the Mythos Era: ‘Assume You’re Unpatched’
Start Here: Strong Monitoring, Behavior-Based Controls, Virtual Patching Thanks to Anthropic’s Mythos presaging a world in which zero-day exploits are common, one cybersecurity expert says the new mantra is this: assume you are unpatched. Vendors and customers must focus more than ever on strong monitoring, behavior-based controls and virtual patching. First seen on govinfosecurity.com Jump…
-
Hackers Exploit Adobe PDF Flaw for Months to Steal Data, No Fix Yet
A critical Adobe Acrobat zero-day has been exploited for months via malicious PDFs to steal data and potentially take over systems, with no patch yet available. The post Hackers Exploit Adobe PDF Flaw for Months to Steal Data, No Fix Yet appeared first on TechRepublic. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-adobe-acrobat-zero-day-pdf-exploit-months/
-
Zero Days for the Masses: Mythos Presages Exploit Tsunami
Asymmetry Between Exploits Wielded by Nation-States and Hackers Will Disappear. Anthropic’s announcement that its Mythos Preview large language model can find serious zero-day flaws across all manner of code bases old and new, and quickly chain vulnerabilities together to build working exploits, promises to democratize access to such capabilities. First seen on govinfosecurity.com Jump to…
-
Adobe Reader Zero-Day Exploited to Steal Data via Malicious PDFs
An Adobe Reader zero-day vulnerability is being actively exploited via malicious PDFs, allowing hackers to steal data without user interaction, with no patch available. First seen on hackread.com Jump to article: hackread.com/adobe-reader-zero-day-exploit-data-malicious-pdfs/
-
Adobe Reader Zero-Day Exploited to Steal Data via Malicious PDFs
An Adobe Reader zero-day vulnerability is being actively exploited via malicious PDFs, allowing hackers to steal data without user interaction, with no patch available. First seen on hackread.com Jump to article: hackread.com/adobe-reader-zero-day-exploit-data-malicious-pdfs/
-
Adobe Reader Zero-Day Exploited to Steal Data via Malicious PDFs
An Adobe Reader zero-day vulnerability is being actively exploited via malicious PDFs, allowing hackers to steal data without user interaction, with no patch available. First seen on hackread.com Jump to article: hackread.com/adobe-reader-zero-day-exploit-data-malicious-pdfs/
-
Adobe Acrobat Reader Zero Day Exploited in Active PDF Attacks
An Adobe Acrobat zero day is being exploited in the wild. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/threats/adobe-acrobat-reader-zero-day-exploited-in-active-pdf-attacks/
-
Months-old Adobe Reader zero-day uses PDFs to size up targets
Malicious PDFs abuse legit features to harvest system data and decide which victims get a 2nd-stage payload First seen on theregister.com Jump to article: www.theregister.com/2026/04/09/monthsold_adobe_reader_zeroday_uses/
-
ThreatsDay Bulletin: Hybrid P2P Botnet, 13-Year-Old Apache RCE and 18 More Stories
Thursday. Another week, another batch of things that probably should’ve been caught sooner but weren’t.This one’s got some range, old vulnerabilities getting new life, a few “why was that even possible” moments, attackers leaning on platforms and tools you’d normally trust without thinking twice. Quiet escalations more than loud zero-days, but the kind that matter…
-
Acrobat Reader zero-day exploited in the wild for many months
Unknown attackers have exploited a zero-day Adobe Acrobat Reader vulnerability since November 2025 and possibly even earlier, security researcher Haifei Li has discovered. PDF … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/04/09/acrobat-reader-zero-day-exploited/
-
Acrobat Reader zero-day exploited in the wild for many months
Unknown attackers have exploited a zero-day Adobe Acrobat Reader vulnerability since November 2025 and possibly even earlier, security researcher Haifei Li has discovered. PDF … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/04/09/acrobat-reader-zero-day-exploited/
-
Acrobat Reader zero-day exploited in the wild for many months
Unknown attackers have exploited a zero-day Adobe Acrobat Reader vulnerability since November 2025 and possibly even earlier, security researcher Haifei Li has discovered. PDF … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/04/09/acrobat-reader-zero-day-exploited/
-
Adobe Reader Zero-Day Exploited via Malicious PDFs Since December 2025
Threat actors have been exploiting a previously unknown zero-day vulnerability in Adobe Reader using maliciously crafted PDF documents since at least December 2025.The finding, detailed by EXPMON’s Haifei Li, has been described as a highly-sophisticated PDF exploit. The artifact (“Invoice540.pdf”) first appeared on the VirusTotal platform on November 28, 2025. A second First seen on…
-
PDF öffnen reicht: Zero-Day-Lücke in Adobe Reader seit Monaten unter Beschuss
Angreifer nutzen seit Ende 2025 eine Zero-Day-Lücke in Adobe Reader aus, um Daten abzugreifen und Schadcode einzuschleusen. Ein Forscher schlägt Alarm. First seen on golem.de Jump to article: www.golem.de/news/pdf-oeffnen-reicht-ungepatchte-luecke-in-adobe-reader-seit-monaten-ausgenutzt-2604-207376.html
-
PDF öffnen reicht: Ungepatchte Lücke in Adobe Reader seit Monaten ausgenutzt
Angreifer nutzen seit Ende 2025 eine Zero-Day-Lücke in Adobe Reader aus, um Daten abzugreifen und Schadcode einzuschleusen. Ein Forscher schlägt Alarm. First seen on golem.de Jump to article: www.golem.de/news/pdf-oeffnen-reicht-ungepatchte-luecke-in-adobe-reader-seit-monaten-ausgenutzt-2604-207376.html
-
Patch windows collapse as timeexploit accelerates
N-day exploitation: Rapid7 Labs validated its findings about a more febrile threat environment by producing both n-day and zero-day exploits using AI-assisted research, substantially reducing development time.In practice, n-day bugs, or the development of exploits against patched software, are a bigger problem than headline-grabbing zero-day vulnerabilities, adds Leeann Nicolo, incident response lead at Coalition, a technology…
-
Weak at the seams
Tags: advisory, ai, attack, automation, business, cloud, compliance, control, crowdstrike, cybersecurity, data, data-breach, endpoint, exploit, finance, firewall, framework, healthcare, infrastructure, insurance, Internet, network, resilience, risk, service, supply-chain, technology, tool, update, vulnerability, windows, zero-dayThe normal choices are the dangerous ones: Consider the stack a typical large enterprise was running in 2024: One vendor for ERP and supply chain, another for perimeter enforcement, another for networking and another for endpoint protection. Standard choices, responsibly made. Within a twelve-month window, each of those categories experienced significant disruptions, from zero-day exploits…
-
Weak at the seams
Tags: advisory, ai, attack, automation, business, cloud, compliance, control, crowdstrike, cybersecurity, data, data-breach, endpoint, exploit, finance, firewall, framework, healthcare, infrastructure, insurance, Internet, network, resilience, risk, service, supply-chain, technology, tool, update, vulnerability, windows, zero-dayThe normal choices are the dangerous ones: Consider the stack a typical large enterprise was running in 2024: One vendor for ERP and supply chain, another for perimeter enforcement, another for networking and another for endpoint protection. Standard choices, responsibly made. Within a twelve-month window, each of those categories experienced significant disruptions, from zero-day exploits…
-
Hackers exploiting Acrobat Reader zero-day flaw since December
Attackers have been exploiting a zero-day vulnerability in Adobe Reader using maliciously crafted PDF documents since at least December. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/hackers-exploiting-acrobat-reader-zero-day-flaw-since-december/
-
ISMG Editors: Anthropic Bug Finder Sparks Zero-Day Dread
Also: How AI May Democratize Cybercrime and How Everyday Routers Enable Espionage. In this week’s ISMG panel, four ISMG editors discussed big shifts in cybersecurity: Anthropic’s dangerous new AI model that can uncover thousands of zero-days, growing concerns about a surge in AI-driven flaws, and the FBI disrupting a Russian espionage campaign targeting everyday routers.…
-
BlueHammer: Windows zero-day exploit leaked
A buggy but functional proof-of-concept (PoC) exploit for an unpatched Windows local privilege escalation vulnerability dubbed BlueHammer has been published on GitHub by … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/04/08/bluehammer-windows-zero-day-exploit-leaked/
-
prompted 2026 FENRIR: Al Hunting For Al Zero-Days At Scale
Author, Creator & Presenter: Peter Girnus, Senior Threat Researcher, TrendAI & Derek Chen, Vulnerability Researcher, TrendAI Our thanks to [un]prompted for publishing their Creators, Authors and Presenter’s outstanding [un]prompted 2026 AI Security Practitioner content on the Organizations’ YouTube Channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/04/unprompted-2026-fenrir-al-hunting-for-al-zero-days-at-scale/
-
‘BlueHammer’ Exploit Targets Windows, Potentially Impacting 1 Billion+ Devices
A researcher released a working ‘BlueHammer’ Windows zero-day exploit that could impact over 1 billion devices, granting SYSTEM-level access and leaving no patch yet. The post ‘BlueHammer’ Exploit Targets Windows, Potentially Impacting 1 Billion+ Devices appeared first on TechRepublic. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-bluehammer-windows-zero-day-exploit-microsoft/
-
Anthropic Launches Claude Mythos Preview Focused on Zero-Day Vulnerability Discovery
Anthropic recently unveiled Claude Mythos Preview, a groundbreaking general-purpose language model demonstrating an unprecedented, emergent ability to autonomously discover and exploit zero-day vulnerabilities. In response to these powerful capabilities, the company introduced Project Glasswing, a coordinated defensive initiative aimed at securing critical software infrastructure before cyberattackers can leverage similar tools. This release marks a watershed…
-
Hackers Target Adobe Reader Users With Sophisticated Zero-Day Exploit
Tags: adobe, attack, cyber, exploit, hacker, intelligence, remote-code-execution, threat, vulnerability, zero-daySecurity researchers at EXPMON have uncovered a highly sophisticated, unpatched zero-day vulnerability actively targeting Adobe Reader users. The exploit, first detected in the wild late last month, allows threat actors to silently steal local files, gather sensitive system information, and potentially deploy remote code execution (RCE) attacks against compromised machines. According to the threat intelligence…
-
Hackers Target Adobe Reader Users With Sophisticated Zero-Day Exploit
Tags: adobe, attack, cyber, exploit, hacker, intelligence, remote-code-execution, threat, vulnerability, zero-daySecurity researchers at EXPMON have uncovered a highly sophisticated, unpatched zero-day vulnerability actively targeting Adobe Reader users. The exploit, first detected in the wild late last month, allows threat actors to silently steal local files, gather sensitive system information, and potentially deploy remote code execution (RCE) attacks against compromised machines. According to the threat intelligence…

