- Cyber Attackers
- Security Weakness
- Operating Systems (OSes)
- Users Affected
- Computer Vulnerabilities
- Critical Issue
- Denial of Service Attacks (DoS)
- Private Data / PII / Information
- Software Exploitation
- Cyber Attacks
- Malware
- Distributed Denial of Service Attacks (DDoS)