Making use of various approaches, threat detection and reaction equipment are crafted to forestall these evasive cyber threats. Phishing: A technique most frequently used by cyber criminals mainly because it's easy to execute and might make the effects They are looking for with little hard work. It is largely bogus https://ieeexplore.ieee.org/document/9941250