Making use of a number of techniques, threat detection and reaction applications are designed to forestall these evasive cyber threats. Phishing: A technique most often employed by cyber criminals because it's easy to execute and can produce the final results They are on the lookout for with little effort and https://ieeexplore.ieee.org/document/9941250