Flaw is under active attack, according to Google security researcher
Attackers have perfected it, and IT leaders need to get better at the return swing
Flaw used to attack NATO summit attendees remains unpatched
Enable arbitrary code execution on iPhones, iPads and Macs
Hackers capitalised on differences between European and US payment systems
Steals information including login credentials, browsing history, bookmarks and even installed games
An unauthenticated attacker may exploit the vulnerability to tamper with encrypted traffic, the company says
The bug could allow an unauthenticated user to execute unauthorised commands via specifically crafted requests
Midnight Blizzard/Nobelium/Cozy Bear threat group is focusing on governments, IT service providers, defence industry, among others