Attackers have been exploiting a zero-day vulnerability in Adobe Reader using maliciously crafted […]
A locally authenticated attacker with low privileges can bypass authentication due to insecure […]
Microsoft has suspended developer accounts used to maintain multiple high-profile open-source projects without […]