Hackers started scanning for vulnerable Exchange servers minutes after patches were released
Threat actors found scanning the Internet almost as soon as Exchange vulnerabilities were disclosed.
Threat actors found scanning the Internet almost as soon as Exchange vulnerabilities were disclosed.