Zero-day threats are everywhere. On any given day over the last three years, cybercriminals had access to at least 85 vulnerabilities targeting widely used software from Microsoft, Apple, Oracle, and Adobe*. That estimate includes only vulnerabilities that were eventually reported. The true number of zero-day vulnerabilities available to cybercriminals could be much higher.

This paper explains the dangers of zero-day attacks and why traditional defenses are powerless against them. It also outlines 11 zero-day attacks discovered by FireEye in 2013 and how they were used in real-world attacks. Finally, the paper recommends nine practical steps for mitigating the
risks of zero-day attacks.

* Kelly Jackson Higgins (Security Dark Reading). Hacking The Zero-Day Vulnerability Market. December 2013

Learn What Zero Days were Discovered in 2013 and What That Means for the Traditional Security Model

Finding and Stopping Zero Day Attacks 

Preview

FireEye discovered and reported 11 zero-day vulnerabilities in 2013—by far the most of any security company. Among the top 10 cyber security companies (ranked by security-related revenue), only two other zero-day vulnerability were reported that year. This gap underscores the difficulty in detecting zero-day attacks, especially by traditional cyber defenses...

Download the Report

© 2018 FireEye, Inc. All rights reserved. Privacy Policy. FireEye on Facebook    FireEye on Twitter    FireEye on LinkedIn    FireEye Blog: Malware Intelligence Lab