Today > 1 Critical | 5 High | 20 Medium vulnerabilities - You can now download lists of IOCs here!
1 attack reports | 0 vulnerabilities
Check Point Research identified an unusual pattern involving PDF exploitation, mainly targeting users of Foxit Reader. This exploit triggers security warnings that could deceive users into executing harmful commands. The exploitation occurs through a flawed design in Foxit Reader, showing 'OK' as t…