Attack MethodsAlso called: "zero day exploit", "0-day vulnerability", "0day"
Zero-day vulnerabilities are dangerous because no patch exists when they are first exploited, leaving organizations defenseless until vendors respond.
Why "zero-day"
- The vendor has had zero days to fix the vulnerability since it became known.
- Often discovered by attackers or security researchers simultaneously.
- Can remain unknown for months or years before discovery.
Zero-day lifecycle
- Discovery: Attacker or researcher finds the vulnerability.
- Exploitation: Attackers develop and deploy exploits in the wild.
- Detection: Security community or vendor becomes aware of attacks.
- Patch development: Vendor creates and tests a fix.
- Patch deployment: Organizations apply updates to remediate.
Why they matter
- Bypass traditional signature-based defenses that rely on known attack patterns.
- Often used in targeted attacks against high-value organizations.
- Can compromise even fully-patched systems if the vulnerability is unknown.
- Valuable on the black market, sometimes selling for millions of dollars.
Defensive strategies
- Deploy defense-in-depth controls that do not rely solely on signatures.
- Use behavioral analysis and anomaly detection (EDR, NGFW, SIEM).
- Implement application allowlisting and least-privilege access controls.
- Segment networks to limit lateral movement if exploitation occurs.
- Maintain incident response capabilities for rapid containment.
- Subscribe to threat intelligence feeds for early warning of emerging threats.