prime infrastructure vulnerabilities and exploits