In today's virtual landscape, cyber threats pose a constant and evolving challenge. These insidious violations can target individuals, organizations, and even states, causing widespread damage. From ransomware to social engineering, cybercriminals employ a variety of advanced tactics to hack vulnerabilities and steal sensitive assets. As a result