Abstract: With the rise in tightening of the Cybersecurity rules and policies implemented by the corporate houses, the work that malicious hackers need to do to compromise a system has risen ...