Threat intelligence observations show that a single threat actor is responsible for most of the active exploitation of two ...