unpatched software, or known vulnerabilities to gain control. Hackers may also use port scanning techniques to identify open ports and launch attacks, potentially compromising critical infrastructure.