- Cyber Attackers
- Computer Vulnerabilities
- Security Weakness
- Critical Issue
- Cyber Attacks
- Operating Systems (OSes)
- Distributed Denial of Service Attacks (DDoS)
- Users Affected
- Software Exploitation
- Malware
- Denial of Service Attacks (DoS)
- Private Data / PII / Information