CYBER VULNERABILITIES