Computer network security
Software testing
Computing
Vulnerability
Zero-day attack
Exploit
Hacker
Computer security
Cyberwarfare
Hacking