Zero-day threats are everywhere. On any given day over the last three years, cybercriminals had access to at least 85 vulnerabilities targeting widely used software from Microsoft, Apple, Oracle, and Adobe*. That estimate includes only vulnerabilities that were eventually reported. The true number of zero-day vulnerabilities available to cybercriminals could be much higher.
This paper explains the dangers of zero-day attacks and why traditional defenses are powerless against them. It also outlines 11 zero-day attacks discovered by FireEye in 2013 and how they were used in real-world attacks. Finally, the paper recommends nine practical steps for mitigating the
risks of zero-day attacks.
* Kelly Jackson Higgins (Security Dark Reading). Hacking The Zero-Day Vulnerability Market. December 2013
Preview
FireEye discovered and reported 11 zero-day vulnerabilities in 2013—by far the most of any security company. Among the top 10 cyber security companies (ranked by security-related revenue), only two other zero-day vulnerability were reported that year. This gap underscores the difficulty in detecting zero-day attacks, especially by traditional cyber defenses...
Download the Report