How can modern security teams detect and neutralize stealthy reconnaissance scans like XMAS, NULL and FIN — without disrupting legitimate traffic — and what concrete, practical controls (firewall/IDS rules, OS TCP hardening, rate-limiting, network-behavior analytics, segmentation, and red-team...