RANSOMWARE ATTACK VECTORS: KEY ENTRY POINTS HACKERS EXPLOIT & HOW X-PHY STOPS THEM