Transforming a newly discovered software vulnerability into a cyberattack used to take months. Today—as the recent headlines ...