Abstract: Cyberattacks continue to evolve in sophistication, posing significant risks to organizations that rely on networked infrastructures. Traditional risk assessment methods, often reliant on ...