Viewing a single comment thread. View all comments

Shabby wrote

The vulnerability is not part of the applications themselves but of the underlying Electron framework—and that vulnerability allows malicious activities to be hidden within processes that appear to be benign.

2