Cybersecurity vulnerability