UNDERSTANDING RANSOMWARE ATTACK VECTORS: HOW THREATS INFILTRATE AND HOW X-PHY PROTECTS YOU