Reasoning Under Threat: Symbolic and Neural Techniques for Cybersecurity Verification