Thus, has somebody thought of exploiting and patching the attackers in response?
Common, but by no means ubiquitous.
Thus, has somebody thought of exploiting and patching the attackers in response?