Technology ❯ Cybersecurity ❯ Threats ❯ Vulnerabilities
The quiet UI change exposes full shortcut commands to counter years of .lnk abuse by state and criminal actors.