In a recent discovery made in June 2022, cybersecurity experts found that vulnerabilities in various systems were being exploited in the wild. This has led to a range of attacks including the introduction of harmful code, botnets, phishing attempts, and the spread of malicious software. These attacks have resulted in personal data theft, destruction of systems, extortion and other fraudulent activities.
To combat these threats, experts have initiated measures to prevent further exploitation of vulnerabilities. It involves the detection of vulnerabilities, patch development and implementation, regular updates of antivirus databases, and basic cybersecurity training for users to minimize the risks of being attacked.
/Reports, release notes, official announcements.