During 2022, cyber-attacks are increasing and evolving. The attacks range from simple to complex and both are used by hackers to gain access, cloak their malware and execute their payload or exfiltrate data. Like trained invaders, their attack will begin with reconnaissance. Cyber actors will do their best to uncover exposed assets and probe their target's attack surface for gaps that can be used as future entry points. The first line of defense is to limit the potentially useful information