Essential Guide

How to hone an effective vulnerability management program

A comprehensive collection of articles, videos and more, hand-picked by our editors

zero-day vulnerability

A zero-day vulnerability is a flaw in software, hardware or firmware that is exploited as soon as or before it becomes generally known to the public.

A zero-day vulnerability is a flaw that leaves software, hardware or firmware defenseless against an attack that occurs the very same day the vulnerability is discovered. Such an attack is called a zero-day exploit, meaning that there are zero days between the time the vulnerability is discovered and the first attack.

The majority of  vulnerabilities that make zero-day attacks possible are caused by poor software code. Unfortunately information about such vulnerabilities is increasingly being sold or traded on the darknet. To debug vulnerabilities, developers must create and release a patch and enterprises must implement the patch in a timely manner. Enterprises can reduce the likelihood of falling prey to an zero-day attack by implementing enterprise information security best practices, including:

 

This was first published in March 2014

Continue Reading About zero-day vulnerability

Glossary

'zero-day vulnerability' is part of the:

View All Definitions

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

Essential Guide

How to hone an effective vulnerability management program

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close