Like a burglar walking through a neighborhood checking doors and windows, attackers constantly scan the internet to find systems they can reach. Upon finding them, they look for low-hanging fruit — weaknesses that might gain them access, such as weak or leaked user credentials, unpatched vulnerabilities, or misconfigurations.