Real-World Cybersecurity Scenarios