According to their report, the cybersecurity researchers “quickly analyzed the exploit code, reverse-engineered its logic, ...