SlideShare ist ein Scribd-Unternehmen logo
1 von 14
Zero Day Exploits
A Primer
A zero day vulnerability refers to a
hole in software that is unknown to
the vendor. This security hole is then
exploited by hackers before the
vendor becomes aware and hurries
to fix it—this exploit is called a zero
day attack.
What is a zero day vulnerability ?
• Every organization is at risk for zero-day exploits
regardless of size.
• These exploits will often circulate for months until the
vulnerability is made public, leaving organizations
unprotected.
• The goals of these exploits include, but are not
limited to, monitoring of the target’s operations, theft
of secrets, and production disruption.
• These exploits are often designed or purchased for
those specific purposes by various organizations
including governments and organized crime.
Characteristics of Exploits
Demand of Exploits
• There is currently more demand in
the market for zero-day exploits than
there is supply which makes the
business of selling these exploits
lucrative
(Bilge & Dumitras, 2012).
Detection of an Exploit
• The longer the exploit goes undetected,
the more lucrative the exploit.
• The average exploit goes undetected for
312 days permitting the harmful purpose
of the exploit to affect many
organizations
(Bilge & Dumitras, 2012).
Life Span of a Zero-Day Exploit
• There is a finite life time of all zero-day exploits.
• The closer the life span of a zero-day exploit is to
zero, the less time it has to cause damage across
various organizations.
• Once a zero-day exploit has been made public
and patches are made available to correct the
vulnerability, the exploit is considered
preventable and technically is just an exploit
versus a zero-day exploit.
Protecting - Zero Day Exploits
1.Update your Operating System
Regularly
2.Install strong antivirus software
3.Keep your applications updated
4.Use secure Browsers
5.Download things from reputed sources
6.Remain updated about happenings
about vulnerabilities
Thank you
Advocate Prashant Mali
www.prashantmali.com
@CyberMahaGuru
All Image Source : Bromium

Weitere ähnliche Inhalte

Was ist angesagt?

Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
Stephen Lahanas
 

Was ist angesagt? (20)

Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Application Security - Your Success Depends on it
Application Security - Your Success Depends on itApplication Security - Your Success Depends on it
Application Security - Your Success Depends on it
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
VAPT PRESENTATION full.pptx
VAPT PRESENTATION full.pptxVAPT PRESENTATION full.pptx
VAPT PRESENTATION full.pptx
 
Cyber Security Standards Compliance
Cyber Security Standards ComplianceCyber Security Standards Compliance
Cyber Security Standards Compliance
 
Spyware and rootkit
Spyware and rootkitSpyware and rootkit
Spyware and rootkit
 
Cyber security
Cyber securityCyber security
Cyber security
 
Advanced persistent threats(APT)
Advanced persistent threats(APT)Advanced persistent threats(APT)
Advanced persistent threats(APT)
 
Threat Intelligence
Threat IntelligenceThreat Intelligence
Threat Intelligence
 
Cyber attack
Cyber attackCyber attack
Cyber attack
 
Leveraging MITRE ATT&CK - Speaking the Common Language
Leveraging MITRE ATT&CK - Speaking the Common LanguageLeveraging MITRE ATT&CK - Speaking the Common Language
Leveraging MITRE ATT&CK - Speaking the Common Language
 
Malware
MalwareMalware
Malware
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
 
VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing
 
SQL INJECTION
SQL INJECTIONSQL INJECTION
SQL INJECTION
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Management
 
Cyber security and demonstration of security tools
Cyber security and demonstration of security toolsCyber security and demonstration of security tools
Cyber security and demonstration of security tools
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Advanced Persistent Threat
Advanced Persistent ThreatAdvanced Persistent Threat
Advanced Persistent Threat
 

Andere mochten auch

Andere mochten auch (20)

Exploits - from zero day to ongoing threat
Exploits - from zero day to ongoing threatExploits - from zero day to ongoing threat
Exploits - from zero day to ongoing threat
 
SentinelOne Buyers Guide
SentinelOne Buyers GuideSentinelOne Buyers Guide
SentinelOne Buyers Guide
 
La tecnologia y sus multiples relaciones
La tecnologia y sus multiples relacionesLa tecnologia y sus multiples relaciones
La tecnologia y sus multiples relaciones
 
StackLight (aka LMA)
StackLight (aka LMA)StackLight (aka LMA)
StackLight (aka LMA)
 
revisedhoneypot429
revisedhoneypot429revisedhoneypot429
revisedhoneypot429
 
Container con toronto
Container con torontoContainer con toronto
Container con toronto
 
WXRCTVYV
WXRCTVYVWXRCTVYV
WXRCTVYV
 
Webinar: are casbs ready for primetime?
Webinar: are casbs ready for primetime?Webinar: are casbs ready for primetime?
Webinar: are casbs ready for primetime?
 
In Plain Sight: The Perfect Exfiltration
In Plain Sight: The Perfect ExfiltrationIn Plain Sight: The Perfect Exfiltration
In Plain Sight: The Perfect Exfiltration
 
20160713 2016 the honeynet projct annual workshop focus and global trends
20160713 2016 the honeynet projct annual workshop focus and global trends20160713 2016 the honeynet projct annual workshop focus and global trends
20160713 2016 the honeynet projct annual workshop focus and global trends
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Derbycon Bromium Labs: Sandboxes
Derbycon Bromium Labs: SandboxesDerbycon Bromium Labs: Sandboxes
Derbycon Bromium Labs: Sandboxes
 
CASBs: Real World Use Cases
CASBs: Real World Use CasesCASBs: Real World Use Cases
CASBs: Real World Use Cases
 
CASBs - A New Hope
CASBs - A New HopeCASBs - A New Hope
CASBs - A New Hope
 
8 questions to ask when evaluating a Cloud Access Security Broker
8 questions to ask when evaluating a Cloud Access Security Broker8 questions to ask when evaluating a Cloud Access Security Broker
8 questions to ask when evaluating a Cloud Access Security Broker
 
Mirantis open stack deployment automation
Mirantis open stack deployment automationMirantis open stack deployment automation
Mirantis open stack deployment automation
 
If We Only Had the Time: How Security Teams Can Focus On What’s Important
If We Only Had the Time: How Security Teams Can Focus On What’s ImportantIf We Only Had the Time: How Security Teams Can Focus On What’s Important
If We Only Had the Time: How Security Teams Can Focus On What’s Important
 
Overview
OverviewOverview
Overview
 
The Deploy Master: From Basic to Zero Downtime, Blue/Green, A/B and Canary
The Deploy Master: From Basic to Zero Downtime, Blue/Green, A/B and CanaryThe Deploy Master: From Basic to Zero Downtime, Blue/Green, A/B and Canary
The Deploy Master: From Basic to Zero Downtime, Blue/Green, A/B and Canary
 
How to Select a Security Visibility Solution
How to Select a Security Visibility SolutionHow to Select a Security Visibility Solution
How to Select a Security Visibility Solution
 

Ähnlich wie zero day exploits

Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copyBest_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
Stephanie McVitty
 
What is a Zero-Day Exploit Understanding the Threat of Unknown Vulnerabilitie...
What is a Zero-Day Exploit Understanding the Threat of Unknown Vulnerabilitie...What is a Zero-Day Exploit Understanding the Threat of Unknown Vulnerabilitie...
What is a Zero-Day Exploit Understanding the Threat of Unknown Vulnerabilitie...
uzair
 
VulnerabilityRewardsProgram
VulnerabilityRewardsProgramVulnerabilityRewardsProgram
VulnerabilityRewardsProgram
Taha Kachwala
 
SOD-Presentation-Des-Moines-10.19.21-v2.pptx
SOD-Presentation-Des-Moines-10.19.21-v2.pptxSOD-Presentation-Des-Moines-10.19.21-v2.pptx
SOD-Presentation-Des-Moines-10.19.21-v2.pptx
TamaOlan1
 
Why-Cyber-Security-Matters-Protecting-Your-Business-and-Your-Reputation.pptx
Why-Cyber-Security-Matters-Protecting-Your-Business-and-Your-Reputation.pptxWhy-Cyber-Security-Matters-Protecting-Your-Business-and-Your-Reputation.pptx
Why-Cyber-Security-Matters-Protecting-Your-Business-and-Your-Reputation.pptx
dhananjay80
 
Project Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxProject Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docx
wkyra78
 

Ähnlich wie zero day exploits (20)

Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copyBest_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
 
What is a Zero-Day Exploit Understanding the Threat of Unknown Vulnerabilitie...
What is a Zero-Day Exploit Understanding the Threat of Unknown Vulnerabilitie...What is a Zero-Day Exploit Understanding the Threat of Unknown Vulnerabilitie...
What is a Zero-Day Exploit Understanding the Threat of Unknown Vulnerabilitie...
 
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
 
Responding to and recovering from sophisticated security attacks
Responding to and recovering from sophisticated security attacksResponding to and recovering from sophisticated security attacks
Responding to and recovering from sophisticated security attacks
 
Solar winds supply chain breach - Insights from the trenches
Solar winds supply chain breach - Insights from the trenchesSolar winds supply chain breach - Insights from the trenches
Solar winds supply chain breach - Insights from the trenches
 
VulnerabilityRewardsProgram
VulnerabilityRewardsProgramVulnerabilityRewardsProgram
VulnerabilityRewardsProgram
 
Cybersecurity Concerns You Should be Thinking About
Cybersecurity Concerns You Should be Thinking AboutCybersecurity Concerns You Should be Thinking About
Cybersecurity Concerns You Should be Thinking About
 
SOD-Presentation-Des-Moines-10.19.21-v2.pptx
SOD-Presentation-Des-Moines-10.19.21-v2.pptxSOD-Presentation-Des-Moines-10.19.21-v2.pptx
SOD-Presentation-Des-Moines-10.19.21-v2.pptx
 
Using 80 20 rule in application security management
Using 80 20 rule in application security managementUsing 80 20 rule in application security management
Using 80 20 rule in application security management
 
Why-Cyber-Security-Matters-Protecting-Your-Business-and-Your-Reputation.pptx
Why-Cyber-Security-Matters-Protecting-Your-Business-and-Your-Reputation.pptxWhy-Cyber-Security-Matters-Protecting-Your-Business-and-Your-Reputation.pptx
Why-Cyber-Security-Matters-Protecting-Your-Business-and-Your-Reputation.pptx
 
Hiding in Plain Sight: The Danger of Known Vulnerabilities
Hiding in Plain Sight: The Danger of Known VulnerabilitiesHiding in Plain Sight: The Danger of Known Vulnerabilities
Hiding in Plain Sight: The Danger of Known Vulnerabilities
 
Project Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxProject Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docx
 
Threat Intelligence + SIEM: A Force to be Reckoned With
Threat Intelligence +  SIEM: A Force to be Reckoned WithThreat Intelligence +  SIEM: A Force to be Reckoned With
Threat Intelligence + SIEM: A Force to be Reckoned With
 
Top Strategies to Capture Security Intelligence for Applications
Top Strategies to Capture Security Intelligence for ApplicationsTop Strategies to Capture Security Intelligence for Applications
Top Strategies to Capture Security Intelligence for Applications
 
What Role Do Zero-Day Vulnerabilities Play In Modern Security Solutions?
What Role Do Zero-Day Vulnerabilities Play In Modern Security Solutions?What Role Do Zero-Day Vulnerabilities Play In Modern Security Solutions?
What Role Do Zero-Day Vulnerabilities Play In Modern Security Solutions?
 
Internal Threats: The New Sources of Attack
Internal Threats: The New Sources of AttackInternal Threats: The New Sources of Attack
Internal Threats: The New Sources of Attack
 
Cyber security # Lec 1
Cyber security # Lec 1Cyber security # Lec 1
Cyber security # Lec 1
 
The significance of the 7 Colors of Information Security
The significance of the 7 Colors of Information SecurityThe significance of the 7 Colors of Information Security
The significance of the 7 Colors of Information Security
 
Cyber security and AI
Cyber security and AICyber security and AI
Cyber security and AI
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
 

Mehr von Adv. Prashant Mali ♛ [Bsc(Phy),MSc(Comp Sci), CCFP,CISSA,LLM]

Mehr von Adv. Prashant Mali ♛ [Bsc(Phy),MSc(Comp Sci), CCFP,CISSA,LLM] (8)

Legality of bitcoins by Prashant Mali
Legality of bitcoins by Prashant MaliLegality of bitcoins by Prashant Mali
Legality of bitcoins by Prashant Mali
 
Electronic Evidence with Case Laws for Maharashtra Judicial Academy by Prasha...
Electronic Evidence with Case Laws for Maharashtra Judicial Academy by Prasha...Electronic Evidence with Case Laws for Maharashtra Judicial Academy by Prasha...
Electronic Evidence with Case Laws for Maharashtra Judicial Academy by Prasha...
 
Ecommerce GST and tax laws in India by prashant mali
Ecommerce GST and tax laws in India by prashant maliEcommerce GST and tax laws in India by prashant mali
Ecommerce GST and tax laws in India by prashant mali
 
Ransomware : A cyber crime without solution ? by Prashant Mali
Ransomware : A cyber crime without solution ? by Prashant MaliRansomware : A cyber crime without solution ? by Prashant Mali
Ransomware : A cyber crime without solution ? by Prashant Mali
 
VAPT, Ethical Hacking and Laws in India by prashant mali
VAPT, Ethical Hacking and Laws in India by prashant maliVAPT, Ethical Hacking and Laws in India by prashant mali
VAPT, Ethical Hacking and Laws in India by prashant mali
 
Privacy and Privacy Law in India By Prashant Mali
Privacy and Privacy Law in India By Prashant MaliPrivacy and Privacy Law in India By Prashant Mali
Privacy and Privacy Law in India By Prashant Mali
 
Panama-Paper-Leak
Panama-Paper-LeakPanama-Paper-Leak
Panama-Paper-Leak
 
Panama Papers Leak and Precautions Law firms should take
Panama Papers Leak and Precautions Law firms should takePanama Papers Leak and Precautions Law firms should take
Panama Papers Leak and Precautions Law firms should take
 

zero day exploits

  • 2. A zero day vulnerability refers to a hole in software that is unknown to the vendor. This security hole is then exploited by hackers before the vendor becomes aware and hurries to fix it—this exploit is called a zero day attack. What is a zero day vulnerability ?
  • 3. • Every organization is at risk for zero-day exploits regardless of size. • These exploits will often circulate for months until the vulnerability is made public, leaving organizations unprotected. • The goals of these exploits include, but are not limited to, monitoring of the target’s operations, theft of secrets, and production disruption. • These exploits are often designed or purchased for those specific purposes by various organizations including governments and organized crime. Characteristics of Exploits
  • 4. Demand of Exploits • There is currently more demand in the market for zero-day exploits than there is supply which makes the business of selling these exploits lucrative (Bilge & Dumitras, 2012).
  • 5. Detection of an Exploit • The longer the exploit goes undetected, the more lucrative the exploit. • The average exploit goes undetected for 312 days permitting the harmful purpose of the exploit to affect many organizations (Bilge & Dumitras, 2012).
  • 6. Life Span of a Zero-Day Exploit • There is a finite life time of all zero-day exploits. • The closer the life span of a zero-day exploit is to zero, the less time it has to cause damage across various organizations. • Once a zero-day exploit has been made public and patches are made available to correct the vulnerability, the exploit is considered preventable and technically is just an exploit versus a zero-day exploit.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13. Protecting - Zero Day Exploits 1.Update your Operating System Regularly 2.Install strong antivirus software 3.Keep your applications updated 4.Use secure Browsers 5.Download things from reputed sources 6.Remain updated about happenings about vulnerabilities
  • 14. Thank you Advocate Prashant Mali www.prashantmali.com @CyberMahaGuru All Image Source : Bromium