When they understand what software your customers or servers operate, which include OS Variation and type, they might improve the chance of being able to exploit and set up some thing inside of your network. Current critiques can be bucketed into two main categories: perimeter stability and attack vulnerabilities. https://ieeexplore.ieee.org/document/9941250