Browsing: cybersecurity vulnerability exploitation