Introduction In the digital age, data has become an invaluable asset. Consequently, the threat landscape has expanded, with hackers constantly seeking to exploit vulnerabilities in various systems. A growing concern is malicious actors’ attraction to targeting...