- Private Data / PII / Information
- Cyber Attacks
- Malware
- Users Affected
- Distributed Denial of Service Attacks (DDoS)
- Critical Issue
- Computer Vulnerabilities
- Cyber Attackers
- Security Weakness
- Software Exploitation
- Operating Systems (OSes)
- Denial of Service Attacks (DoS)