Get a Pentest and security assessment of your IT network.

Cyber Security

Timeline of the Adobe JBIG2 PDF vulnerability

Matthew Watchinski from Sourcefire s Vulnerability Research Team reveals the timeline, from discovery to sale to exploitation to disclosure to patch, of the Adobe JBIG PDF flaw. In this video from Dojosec, Watchinski shows the timeline of the flaw. Watchinski reveals the discovery, sale, exploitation, disclosure and patching to fix the flaw in this video. Dojosesc: The flaw is a flaw in Adobe’s software that can be exploited by the end of the day.

Source: https://threatpost.com/timeline-adobe-jbig2-pdf-vulnerability-042909/72650/

Related posts
Cyber Security

Zip Codes & PII: Are They Personal Data?

Cyber Security

Zero-Day Vulnerabilities: User Defence Guide

Cyber Security

Zero Knowledge Voting with Trusted Server

Cyber Security

ZeroNet: 51% Attack Risks & Mitigation