Exploring Cybersecurity Breaches: Origins, Impact, and Defense Strategies