UNDERSTANDING ATTACK VECTORS: HOW CYBER THREATS EXPLOIT ENTRY POINTS AND HOW X-PHY FIGHTS BACK