An exploit of the vulnerability offers attackers a ransomware surface that doesn’t need email. …read more

Source:: DarkReading