Cyber vulnerabilities