Hackers use PoC exploits in attacks 22 minutes after release
Threat actors are quick to weaponize available proof-of-concept (PoC) exploits in actual attacks, sometimes as quickly as 22 minutes after exploits are made publicly available.
I never understand why lemmy downvotes someone who is trying to help by providing accurate information, presumably because they think that there’s a very small chance that the person they’re replying to isn’t being sarcastic.
Funny enough, I wasn’t entirely sarcastic. I’ve seen some trump memes that day and suspected smth happened to him, but they were the 1st to explicitly tell it as far as I remember 😅