Globalvulnerability→Government and Critical InfrastructureCRITICAL1hGlobalapt→Cryptocurrency and BlockchainCRITICAL9hGlobalmalware→Financial Services / CryptocurrencyCRITICAL10hGlobalinsider→Cloud Computing and SaaSHIGH11hGlobalvulnerability→Industrial Control Systems / Operational TechnologyCRITICAL11hGlobalransomware→Corporate/EnterpriseCRITICAL12hGlobalransomware→Retail/E-commerceHIGH13hGlobalvulnerability→Software Development and AI/ML ServicesCRITICAL15hGlobalvulnerability→Healthcare, Operational Technology, Industrial Control SystemsCRITICAL16hGlobalphishing→Enterprise/Information TechnologyHIGH17hGlobalvulnerability→Government and Critical InfrastructureCRITICAL1hGlobalapt→Cryptocurrency and BlockchainCRITICAL9hGlobalmalware→Financial Services / CryptocurrencyCRITICAL10hGlobalinsider→Cloud Computing and SaaSHIGH11hGlobalvulnerability→Industrial Control Systems / Operational TechnologyCRITICAL11hGlobalransomware→Corporate/EnterpriseCRITICAL12hGlobalransomware→Retail/E-commerceHIGH13hGlobalvulnerability→Software Development and AI/ML ServicesCRITICAL15hGlobalvulnerability→Healthcare, Operational Technology, Industrial Control SystemsCRITICAL16hGlobalphishing→Enterprise/Information TechnologyHIGH17hGlobalvulnerability→Government and Critical InfrastructureCRITICAL1hGlobalapt→Cryptocurrency and BlockchainCRITICAL9hGlobalmalware→Financial Services / CryptocurrencyCRITICAL10hGlobalinsider→Cloud Computing and SaaSHIGH11hGlobalvulnerability→Industrial Control Systems / Operational TechnologyCRITICAL11hGlobalransomware→Corporate/EnterpriseCRITICAL12hGlobalransomware→Retail/E-commerceHIGH13hGlobalvulnerability→Software Development and AI/ML ServicesCRITICAL15hGlobalvulnerability→Healthcare, Operational Technology, Industrial Control SystemsCRITICAL16hGlobalphishing→Enterprise/Information TechnologyHIGH17h