How Are Threat Detection Systems Adapting to Modern Security Threats?