Blueliv Intelligence Briefing
Your cybersecurity news summary
Thursday, July 23rd, 2020
Welcome to today’s intelligence briefing, covering noteworthy items on the cybersecurity news agenda.
Find these stories on the Blueliv Threat Exchange Network, a global community of thousands of cybersecurity experts, IT professionals and academics. Membership is free.
Signed PDF documents can be modified by a “Shadow Attack”
Fifteen out of 28 desktop PDF viewer applications are vulnerable to a new attack that lets malicious threat actors modify the content of digitally signed PDF documents. The main idea behind a Shadow Attack is the concept of "view layers" - different sets of content that are overlaid on top of each other inside a PDF document. Learn more >