VULNERABILITIES IN CYBERATTACKERS