DarkGate Malware Spreading via Messaging Services Posing as PDF Files

A piece of malware known as DarkGate has been observed being spread via instant messaging platforms such as Skype and Microsoft Teams. In these attacks, the messaging apps are used to deliver a Visual Basic for Applications (VBA) loader script that masquerades as a PDF document, which, when opened, triggers the download and execution of […]

Weaponized Excel, OneNote, or PDF Attachments Deliver New WikiLoader Malware

The Italian organizations, including tax agencies, were targeted by a new malware downloader delivering banking Trojan. The new loader malware is presently undergoing active development, employing a diverse array of sophisticated mechanisms to evade detection effectively. This new loader malware was identified by Proofpoint researchers, and they dubbed it “WikiLoader.” This malware was linked to […]

PDF Malware Distribution Has Increased by 500%, as Reported by VirusTotal

A new edition of the “VirusTotal Malware Trends Report” series, which focuses mostly on “Emerging Formats and Delivery Techniques,” has been published by VirusTotal to understand the nature of malicious attacks better. A representative subset of user submissions from January 2021 through the end of June 2023 was utilized for creating all the data in […]

GuLoader Malware is Attacking Law Firms Using Weaponized PDF File

The cybersecurity researchers at Morphisec Labs have been tracking the GuLoader campaign since April of this year and found that it has been actively targeting the law firms that are based in the US along with several other sectors like:- Healthcare Investment firms Targeted sectors (Source – Morphisec) For more than three years, GuLoader (aka […]

Follina, Microsoft Office vulnerability, also affects Foxit PDF Reader; no patches available

A few days ago, a security researcher reported the detection of a zero-day vulnerability in Microsoft Office that could be exploited using apparently harmless Word documents capable of executing PowerShell commands through the Microsoft Support Diagnostic Tool (MSDT). After the flaw, dubbed as Follina, was publicly disclosed and various exploits were released, Microsoft acknowledged the […]

How to perform digital forensics of malicious PDF files? Easily checking if a PDF document has malware or backdoors

The PDF format has become one of the most popular ways to view files, as this format is compatible with all kinds of technological devices, including desktop computers, laptops, electronic tablets and smartphones. Because of this universal presence, threat actors began using these documents to deliver malware and easily deploy other attack variants. This time, […]

18 critical vulnerabilities discovered in Foxit PDF Reader and Foxit PDF Editor. Update your software quickly

Cybersecurity specialists reported the finding of multiple vulnerabilities in Foxit PDF Reader and Foxit PDF Editor, two popular tools for viewing and editing PDF files. According to the report, the successful exploitation of these flaws would allow the deployment of all kinds of attack scenarios. Below are brief descriptions of some of the reported flaws, […]

PDF certification process is vulnerable to new attack variants; flaws affect Adobe, Foxit and other PDF tools

A recent research states that certified PDF files are not protected enough, so they are vulnerable to various types of cyberattack. These files are often used to securely sign agreements between two parties, as certification protects document integrity. The research, by a specialized team at Ruhr University, notes that certified PDF documents employ two specific […]

5 PDF Tricks You Should Know To Improve Document Productivity

Portable Document Format (PDF) is already by default one of the best formats when it comes to documents. The reasons are simple. One of them is that you can access your documents easily from pretty much any device and software, but you know how things usually go in technology: there’s always room for improvements. Keeping your […]

Foxit Reader Vulnerability Let Hackers Run Malicious Code via PDFs

Aleksander Nikolic, the security expert of Cisco Talos has recently detected a vulnerability that is continuously targeting the “Foxit Reader.” However, Foxit has already published an update, so that they can close this severe vulnerability which is allowing attackers to exploit the PDFs to run malicious code remotely.   The security experts have detected many security […]

Editing Text in a PDF File

Computer users come across PDF files almost every day. However, many of them didn’t know that it is possible to edit the text in such files. Almost everyone can simply read the required information and close the document. But as soon as the moment comes to copy something or make any other change in this […]

How to easily check if DOC, RTF, XLS, PPT, PPTX or PDF file has a malware without antivirus like a digital forensics expert

In most cyberattack variants threat actors use legitimate-looking documents loaded with malware, which is why researchers often say it all starts with a Word file, Power Point presentation, Excel spreadsheet, or even a book downloaded from a free PDF file website. This time, digital forensics experts from the International Institute of Cyber Security (IICS) will […]

Chinese APT Hackers “Mustang Panda” Attack Public & Private Sectors Using Weaponized PDF and Word Documents

Researchers discovered an ongoing malware campaign that believed to be operating by a Chinese based threat group called “Mustang Panda” that targets public and private sectors around the world. Mustang Panda threat group activities initially observed in June 2018, since then attackers improved their campaign activities with unique Tactics, Techniques, and Procedures (TTPs). Various targets […]

Critical Foxit PDF Reader Vulnerabilities: Update as soon as possible

A team of web application security experts has discovered multiple security vulnerabilities in Foxit PDF Reader, one of the most popular PDF reader tools and the main competitor of Adobe Reader. The flaws found include remote code execution errors considered highly serious. The researchers, led by Aleksandar Nikolic of Cisco Talos, discovered this set of […]

Password-protected PDFs are not enough to secure sensitive documents. No solutions available

Any deployment, no matter its protections, may be exposed to further hacking attacks. Ethical hacking experts have found a way to extract information contained in Portable Document Format (PDF) files encrypted or password-protected. The group of researchers at Ruhr-Bochum University in Germany published a research entitled “Breaking PDF Encryption”, which reveals two variants of a […]

Best Free PDF Editors In 2019 To Edit And Annotate PDFs

Whether you work in an office or a college pursuing individual, PDFs are a commonly used file format. While PDF files are easy to share, editing them is a difficult task. You need specialized software to edit a PDF file. When it comes to PDF editors, there are plenty of them out there, but the […]

6 Best Free PDF Readers For Mac To Use In 2019

Portable Document Format or PDF is one of the most commonly used file types owing to its compatibility with different operating systems and the fact that it retains the formatting of the document most of the time. Also, PDF files are difficult to edit, which preserves the integrity of the document which is why most […]

Foxit PDF Software Company Suffers Data Breach—Asks Users to Reset Password

If you have an online account with Foxit Software, you need to reset your account password immediately—as an unknown attacker has compromised your personal data and log-in credentials. Foxit Software, a company known for its popular lightweight Foxit PDF Reader and PhantomPDF applications being used by over 525 million users, today announced a data breach […]

50 Free Hacking Ebooks Collection PDF 2019 – HackingVision

50 Free Hacking Ebooks Collection PDF 2019 Ethical Hacking, Hacking ebooks pdf, Hacking ebooks free download, hacking ebooks collection, Best Hacking eBooks. List curated by Hackingvision.com The topics include: Android & iOS Cloud Security Defensive Security IoT Malware Analysis & Forensics Network Pentesting Offensive Security Programming Languages Reverse Engineering SysAdmin Virus Botnet and Malware Wireless Network […]