- Cyber Attackers
- Software Exploitation
- Cyber Attacks
- Critical Issue
- Users Affected
- Security Weakness
- Private Data / PII / Information
- Computer Vulnerabilities
- Malware
- Distributed Denial of Service Attacks (DDoS)
- Operating Systems (OSes)
- Denial of Service Attacks (DoS)