Tag cyber vulnerability exploitation