Note to Practitioners—The rising complexity of software systems introduces new challenges in cybersecurity, notably in how multiple vulnerabilities are exploited simultaneously, a tactic increasingly common in cyber-attacks. This work’s contribution, TCGFormer, offers a novel approach to predict and analyze such threats by recognizing patterns in historical data and predicting future exploits. While our method advances the detection of complex attack strategies, it remains essential to integrate these insights with existing security protocols to enhance their effectiveness. Practitioners are encouraged to consider how this method could be tailored to fit specific security needs, and to explore its integration into broader cybersecurity frameworks to protect against sophisticated cyber threats effectively.">