Authors - Payal Khode, Shailesh Gahane, Arya Kapse, Pankajkumar Anawade, Deepak Sharma Abstract - An important subject that has always remained on top of the most important areas of concern universally is security as the world deals with dynamic change in technology. It is with this background that this paper explores the frailties that arise from the current technological gadgets such as mobile phones, Internet of Things (IoT) devices, and personal computers that are prone to a range of cyber threats. A comprehensive examination of the security threat is taken to show how application weaknesses and system susceptibilities and network-based threats allow the attacker to erode user confidentiality and data integrity. Moreover, this study compares traditional and modern assessment and protection mechanisms, including cryptography techniques, flow inspection tools, signals intelligence technologies, and hardware-based and artificial intelligence-based security measures with the intention of identifying the most effective paradigm for combatting these threats. That way, the present paper is relevant to the ongoing work in the field aiming at designing new countermeasures to improve the vulnerability of assorted present-day technologies to cyber threats.