BlueKeep ‘Mega-Worm’ Looms as Fresh PoC Shows Full System Takeover

A working exploit for the critical remote code-execution flaw shows how an unauthenticated attacker can achieve full run of a victim machine in about 22 seconds.

This entry was posted in Alerts. Bookmark the permalink.