Attackers are constantly looking for ways to exploit the latest vulnerabilities and/or new ways to exploit old vulnerabilities. Cyber-attacks are often leveraged by threat actors as part of a coordinated campaign against a spec...