Security learning notes around SIP scanning, abuse patterns, weak authentication, exposed services, and defensive controls.

Security learning notes around SIP scanning, abuse patterns, weak authentication, exposed services, and defensive controls.