Researchers found that one critical flaw in question is exploitable from the browser, allowing watering-hole attacks.
Source: threatpost.com
Researchers found that one critical flaw in question is exploitable from the browser, allowing watering-hole attacks.
Source: threatpost.com