Resource development: Includes attackers obtaining or stealing resources to utilize them for a foreseeable future attack. Next weaponization is the supply stage — when cybercriminals seek to infiltrate their concentrate on’s community or security technique. Attacks can disable programs entirely or bring about the leaking of delicate information, which would https://ieeexplore.ieee.org/document/9941250