0-day

Top Security Incidents of 2025: Chrome Browser 0-Day Vulnerability Exploitation

February 18, 2026

Background In March 2025, cybersecurity researchers disclosed a highly sophisticated targeted attack campaign named “Operation ForumTroll.” Orchestrated by an unidentified state-sponsored APT group, the operation leveraged a Google Chrome 0-day vulnerability (CVE-2025-2783) as its core weapon. This vulnerability enabled sandbox escape, allowing arbitrary code execution on victims’ Windows systems and granting full control over the targeted […]

An Overview of 2025 Global APT Attack Landscape

Imagem que ilustra como a inteligência artificial pode ser uma fácil entrada para hackers.

February 11, 2026

In 2025, the global cybersecurity situation continued to deteriorate, with a significant rise in the use of 0-day vulnerabilities in Advanced Persistent Threat (APT) attacks, which became a key driver of accelerating threats. Numerous 0-day vulnerabilities were exploited in operating systems, browsers, network devices, and security software, enabling attackers to bypass defenses for extended periods […]

Type1 Font Parsing 0-day Remote Code Execution Vulnerability Threat Alert

April 3, 2020

Overview

On March 23, local time, Microsoft released an out-of-band security advisory ADV200006 to address two critical 0-day vulnerabilities in Adobe Type Manager Library. A vulnerability exists in Microsoft Windows when the Windows Adobe Type Manager Library improperly handles a crafted multi-master font, namely, the Adobe Type 1 PostScript format. An attacker could exploit the vulnerability to cause remote code execution by convincing a user to open a crafted document or viewing it in the Windows Preview pane. (more…)

Search

Subscribe to the NSFOCUS Blog