UNDERSTANDING RANSOMWARE ATTACK VECTORS: HOW X-PHY DEFENDS AGAINST HIDDEN CYBER THREATS