Latest cyber security algorithms in IT industries