Attackers regularly use stolen login qualifications to go through secured documents or steal the data when it is actually in transit involving two network gadgets. While a vulnerability would not assure that an attacker or hacker will concentrate on your network, it does allow it to be easier — https://zbookmarkhub.com/story17214449/a-review-of-cyber-attack-model