- Users Affected
- Critical Issue
- Private Data / PII / Information
- Denial of Service Attacks (DoS)
- Security Weakness
- Malware
- Cyber Attackers
- Computer Vulnerabilities
- Distributed Denial of Service Attacks (DDoS)
- Software Exploitation
- Cyber Attacks
- Operating Systems (OSes)