Sign up for our daily briefing
Make your busy days simpler with Axios AM/PM. Catch up on what's new and why it matters in just 5 minutes.
Stay on top of the latest market trends
Subscribe to Axios Markets for the latest market trends and economic insights. Sign up for free.
Sports news worthy of your time
Binge on the stats and stories that drive the sports world with Axios Sports. Sign up for free.
Tech news worthy of your time
Get our smart take on technology from the Valley and D.C. with Axios Login. Sign up for free.
Get the inside stories
Get an insider's guide to the new White House with Axios Sneak Peek. Sign up for free.
Catch up on coronavirus stories and special reports, curated by Mike Allen everyday
Catch up on coronavirus stories and special reports, curated by Mike Allen everyday
Want a daily digest of the top Denver news?
Get a daily digest of the most important stories affecting your hometown with Axios Denver
Want a daily digest of the top Des Moines news?
Get a daily digest of the most important stories affecting your hometown with Axios Des Moines
Want a daily digest of the top Twin Cities news?
Get a daily digest of the most important stories affecting your hometown with Axios Twin Cities
Want a daily digest of the top Tampa Bay news?
Get a daily digest of the most important stories affecting your hometown with Axios Tampa Bay
Want a daily digest of the top Charlotte news?
Get a daily digest of the most important stories affecting your hometown with Axios Charlotte
A massive dump of software vulnerabilities by WikiLeaks has sent security experts scrambling. Top engineers at Apple, Google and Microsoft are poring over the documents now, sources told Axios.
However, because of the number of vulnerabilities, it is expected to take hours or days to figure out if they vulnerabilities are all real, what has and hasn't been patched, and of the newly discovered issues, which need the most urgent attention. Developing and releasing the actual patches could take weeks or even months.
All three companies were wading through the files, sources said, though none yet has offered up a public comment. Google may end up with the biggest headaches given the fact that so many Android devices are stuck on older versions of the operating system, so millions of devices could be vulnerable even to already plugged holes.
Why this matters: If real, all these exploits are now in the hands of every hacker in the world, rather than just the CIA.