The two vulnerabilities have been exploited in real-life attacks. Read more at straitstimes.com. Read more at ...
The vulnerabilities may have been exploited in 'an extremely sophisticated attack against specific targeted individuals' ...