Symantec's latest Internet Security Threat Report reveals that 430 million new malware variants were discovered in 2015, and the number of zero-day vulnerabilities discovered more than doubled to a record-breaking 54 – a 125 percent increase from 2014. The growing sophistication of cyber-crime rings that have adopted corporate behavior in their structuring of criminal operations, with detailed job roles and management, has increased their efficiency in carrying out attacks and offering services against enterprises and consumers. According to this report, professional cyber criminal attack groups leverage zero-day vulnerabilities for their own advantage or sell them to lower-level criminals on the open market where they are quickly commoditized.
"Zero-day" is a term used to describe the culprit behind many of the security breaches we hear about almost daily in the news. But what exactly does it mean? Zero-day — the first or "zeroth" day — refers to the point in time a security hole in code is revealed to hackers or cybersecurity professionals (e.g., a developer, researcher, software programmer).
The term comes from the Warez scene (warez being slang for wares — an abbreviation for computer software) where computer underground circles distribute unauthorized releases of copyrighted work on the same day as (or even before) the original product is released.
While that is the basic definition, zero-day threat is commonly used to describe two cases:
Zero-Day Vulnerability: This refers to a security flaw in software, an application or operating system that has yet to be revealed to the software maker or antivirus vendors, though the vulnerability may be known to attackers. Because zero-day vulnerabilities have yet to be discovered, the vulnerability is not yet protected by a known signature or patch, leaving companies vulnerable to attacks.
Zero-Day Exploit: This refers to code that attackers use to trigger the zero-day vulnerability to execute their malicious action into the vulnerable software, application or operating system. Since this is doneunbeknownst to the victim, it is a critical cybersecurity threat.
In this slideshow, Guy Caspi, CEO of Deep Instinct, takes a closer look at the explosion of zero-day threats and how deep learning can help organizations better protect their valuable cyber assets.
When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ... More >>