Adobe has patched a critical zero-day vulnerability (CVE-2026-34621) in Acrobat and Reader that was actively exploited in real-world attacks. The flaw allows threat actors to execute arbitrary code on a victim’s system by delivering specially crafted PDF files. Once opened, these malicious PDFs trigger embedded JavaScript, enabling attackers to access sensitive data, interact with local files, and potentially deploy additional payloads. The vulnerability has reportedly been exploited since late 2025, making it a significant security concern for organizations and individuals relying on PDF workflows. The root cause of the issue lies in a prototype pollution vulnerability within the JavaScript engine of Adobe Acrobat Reader. This weakness allows attackers to manipulate object properties and alter application behavior, bypassing intended security controls. By abusing trusted functions, attackers can read local file contents and exfiltrate them to remote servers. The attack may also involve multiple stages, where initial exploitation is used for reconnaissance, followed by selective deployment of more advanced payloads such as sandbox escapes or full remote code execution. To mitigate the risk, users and organizations should immediately update Adobe Acrobat and Reader to the latest patched versions. It is recommended to avoid opening PDF files from unknown or untrusted sources and to disable JavaScript execution in PDF readers wherever possible. Additionally, implementing endpoint detection and response (EDR) solutions, monitoring suspicious file activity, and applying strict email filtering policies can help prevent exploitation attempts. Regular security updates and user awareness remain critical to reducing exposure.
Android users are being targeted in a large-scale malware operation designed to silently enroll victims into premium mobile billing services without consent. The campaign abuses ca...
U.S. and Canadian law enforcement agencies have detained an alleged operator connected to the KimWolf botnet, a cybercrime platform known for conducting large-scale DDoS attacks us...
A newly identified Phishing-as-a-Service (PhaaS) platform named Kali365 is actively targeting Microsoft 365 users by abusing OAuth device authentication flows to bypass multi-facto...