PDF

Analyzing Phishing attacks that use malicious PDFs

Cybersecurity researchers Zoziel Pinto Freire analyzed the use of weaponized PDFs in phishing attacks Every day everybody receives many phishing…

2 years ago

Shadow attacks allow replacing content in signed PDF files

Boffins from the Ruhr University Bochum (Germany) have disclosed a series of new attack methods, dubbed Shadow attacks, against signed…

4 years ago

PDF zero-day samples harvest user data when opened in Chrome

Experts at Exploit detection service EdgeSpot detected several PDF documents that exploit a zero-day flaw in Chrome to harvest user…

5 years ago

Experts devised 3 attacks Show Signed PDF Documents Cannot Be Trusted

Experts found several flaws in popular PDF viewers and online validation services that allow to deceive the digital signature validation…

5 years ago

Malicious PDF Analysis

In the last few days I have done some analysis on malicious documents, especially PDF. Then I thought, "Why not…

5 years ago

How to use weaponized PDF documents to steal Windows credentials

Weaponized documents are the main ingredient for almost any spam and spear-phishing campaign, let's see how to steal windows credentials…

6 years ago

Adobe Reader vulnerability reveals where a PDF is opened

The McAfee security firm found an Adobe Reader vulnerability that reveals where a PDF document is opened. The McAfee security firm found an Adobe…

11 years ago

This website uses cookies.