Adobe has issued a patch for a previously unaddressed zero-day vulnerability in its Acrobat and Reader software, which had been exploited by attackers for months to compromise targeted systems. The flaw allowed malicious actors to create booby-trapped PDF documents that could profile targets and hijack machines. This vulnerability posed a significant threat as it was being actively exploited before a patch was available, putting defenders at a disadvantage. The patch addresses the issue, but the prolonged exploitation period may have already led to significant damage. The vulnerability's existence and exploitation highlight the importance of prompt patching and highlight the challenges of defending against zero-day attacks. The fact that attackers were able to exploit this flaw for an extended period1 underscores the need for continuous monitoring and swift action to mitigate potential threats. This incident matters to security practitioners because it demonstrates the risks associated with zero-day exploitation and the need for proactive defense strategies.