Currently, the majority of economic, comercial, cultural, social, and governmental activities and interactions between nations, encompassing individuals, non-governmental organisations, and government institutions, are conducted within the realm of cyberspace. Presently, numerous private enterprises and governmental institutions globally are encountering the issue of cyber assaults and the peril of wireless communication technologies. In contemporary society, there is a significant reliance on electronic technology, and safeguarding this information from cyber threats poses a formidable challenge. The objective of cyber-attacks is to cause financial harm to corporations. Cyber-attacks may serve military or political objectives in certain instances. Several types of damages include PC viruses, knowledge breaches, data distribution service (DDS), and other forms of attack vectors. For this purpose, diverse entities employ diverse measures to mitigate the harm inflicted by cyber assaults. The field of cyber security involves the monitoring and analysis of up-to-date information regarding the most recent developments in information technology. To date, scholars worldwide have put forth diverse methodologies aimed at averting cyber-attacks or mitigating their deleterious effects. Several techniques are currently in the operational stage, while others remain in the study phase. The objective of this research is to conduct a comprehensive survey and analysis of the latest developments in the realm of cyber security, with a focus on identifying the strengths, weaknesses, and challenges associated with the proposed methodologies. Various forms of novel descendant attacks are thoroughly examined. The discussion pertains to conventional security frameworks in conjunction with the historical and initial-generation techniques of cyber-security. Furthermore, this paper presents emerging trends and recent developments in the field of cyber security, as well as an overview of security threats and challenges. The presented comprehensive review study is anticipated to be beneficial for researchers in the field of IT and cyber security.