Home Blog

Security News & Research

Latest cybersecurity news, threat intelligence and vulnerability disclosures.

Vulnerability

CVE-2026-34621: Adobe Acrobat Reader Zero-Day Exploited for 135 Days Before Patch — Full Attack Chain Analysis

Adobe’s emergency patch for CVE-2026-34621 arrived 135 days after threat actors began exploiting this critical zero-day in Adobe Reader. The attack uses a prototype pollution flaw to execute privileged JavaScript from a malicious PDF — no click required beyond opening the document. CISA has added it to KEV with an April 27 federal deadline. Here is the full technical breakdown.

#Critical#Cybersecurity#RCE#ThreatIntel#Vulnerability
Read Full Article
Supply Chain

CPUID Supply Chain Attack: STX RAT Delivered via Trojanized CPU-Z and HWMonitor Downloads

Threat actors compromised a side API on cpuid.com and replaced download links for CPU-Z and HWMonitor with malicious executables deploying STX RAT — a sophisticated remote access trojan with HVNC and infostealer capabilities. The breach lasted 19 hours and affected users in retail, manufacturing and telecoms across Brazil, Russia and China. Here is the full technical breakdown.

#Cybersecurity#High#Malware#SupplyChain#ThreatIntel
Read Full Article
Vulnerability

CVE-2026-39987: Marimo Python Notebook RCE Exploited in Under 10 Hours — Full Technical Breakdown

A critical pre-authentication RCE vulnerability in Marimo, the open-source Python notebook platform, was weaponized by threat actors in under 10 hours of disclosure — with no public PoC available. Here is the full technical breakdown of the attack chain, attacker TTPs, and what defenders must do right now.

#Critical#CVE-2026-39987#Cybersecurity#Marimo#Python
Read Full Article
Blog

Hello world!

Welcome to WordPress. This is your first post. Edit or delete it, then start writing!

Read Full Article