Unveiling the Shadowy Realms of Cyber Intrusions