Technology ❯ Software ❯ Enterprise Software ❯ Vulnerabilities
A leaked exploit has heightened the risk of rapid follow‑on attacks according to government warnings.