Whenever they know very well what application your consumers or servers run, which includes OS version and type, they might increase the likelihood of with the ability to exploit and put in a thing in your community. Generally, these actors deploy malware in the method by means of phishing e-mails https://www.researchgate.net/publication/365308473_Development_of_Cyber_Attack_Model_for_Private_Network