People who work with open source software tend to be concerned about vulnerabilities in WordPress, Java and other popular products, but criminals and spies who want direct access inside a business or government organization prefer exploiting security holes in office documents. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) … Read >