Technology ❯ Cybersecurity ❯ Vulnerabilities ❯ Software Vulnerabilities
The quiet UI change exposes full shortcut commands to counter years of .lnk abuse by state and criminal actors.