<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[We&#x27;ve been tracking this Adobe 0-day in Acrobat Reader.]]></title><description><![CDATA[<p>We've been tracking this Adobe 0-day in Acrobat Reader. Still no patch from Adobe (and no word on affected versions). Per the discoverer, this attack has been ongoing for months.</p><p><div class="card col-md-9 col-lg-6 position-relative link-preview p-0">



<a href="https://discourse.ifin.network/t/adobe-0-day-seen-in-the-wild/250" title="Adobe 0-day seen in the wild">
<img src="https://discourse.ifin.network/uploads/default/optimized/1X/a73cead887d19ded2346c1dd2fbac9b1fdce5c53_2_1024x537.png" class="card-img-top not-responsive" style="max-height: 15rem;" alt="Link Preview Image" />
</a>



<div class="card-body">
<h5 class="card-title">
<a href="https://discourse.ifin.network/t/adobe-0-day-seen-in-the-wild/250">
Adobe 0-day seen in the wild
</a>
</h5>
<p class="card-text line-clamp-3">This is an interesting find. PDF exploits are rare and this one looks to be very targeted. Also &quot;yummy_adobe_exploit_uwu.pdf&quot; is a malware naming convention that reminds me why I love this community. 
I’m struggling &hellip;</p>
</div>
<a href="https://discourse.ifin.network/t/adobe-0-day-seen-in-the-wild/250" class="card-footer text-body-secondary small d-flex gap-2 align-items-center lh-2">



<img src="https://discourse.ifin.network/uploads/default/optimized/1X/ea367a05f4a0d090bf61d140dc84f744c9ab9bf0_2_32x32.png" alt="favicon" class="not-responsive overflow-hiddden" style="max-width: 21px; max-height: 21px;" />





<p class="d-inline-block text-truncate mb-0">IFIN <span class="text-secondary">(discourse.ifin.network)</span></p>
</a>
</div></p><p><a href="https://infosec.exchange/tags/Adobe" rel="tag">#<span>Adobe</span></a> <a href="https://infosec.exchange/tags/0day" rel="tag">#<span>0day</span></a> <a href="https://infosec.exchange/tags/ThreatIntel" rel="tag">#<span>ThreatIntel</span></a> <a href="https://infosec.exchange/tags/IFIN" rel="tag">#<span>IFIN</span></a></p>]]></description><link>https://board.circlewithadot.net/topic/4a91f82d-fc0a-466c-9dc8-bd1aa5f6a579/we-ve-been-tracking-this-adobe-0-day-in-acrobat-reader.</link><generator>RSS for Node</generator><lastBuildDate>Thu, 30 Apr 2026 15:38:01 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/4a91f82d-fc0a-466c-9dc8-bd1aa5f6a579.rss" rel="self" type="application/rss+xml"/><pubDate>Sat, 11 Apr 2026 01:21:56 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Reply to We&#x27;ve been tracking this Adobe 0-day in Acrobat Reader. on Sat, 11 Apr 2026 13:20:18 GMT]]></title><description><![CDATA[<p>Update: Adobe has a patch out!</p><p><a href="https://helpx.adobe.com/security/products/acrobat/apsb26-43.html" rel="nofollow noopener"><span>https://</span><span>helpx.adobe.com/security/produ</span><span>cts/acrobat/apsb26-43.html</span></a></p><p>And an associated CVE: CVE-2026-34621</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/ap/users/115741367687413652/statuses/116386274885460533</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/ap/users/115741367687413652/statuses/116386274885460533</guid><dc:creator><![CDATA[ifin@infosec.exchange]]></dc:creator><pubDate>Sat, 11 Apr 2026 13:20:18 GMT</pubDate></item></channel></rss>