Similar to:
Describe the security vulnerabilities exploited by the hackers