is known to exploit

3 triples
GPTKB property

Random triples
Subject Object
gptkb:APT28 software vulnerabilities
gptkb:Netsky security vulnerabilities
gptkb:Cults_of_the_Dragon_Below Weaknesses of individuals