Hackers were abusing years-old flaws to execute code and exfiltrate data. …read more
Source:: techradar.com – Gadgets