{"id":7321,"date":"2017-04-12T08:10:09","date_gmt":"2017-04-12T16:10:09","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/04\/12\/news-1112\/"},"modified":"2017-04-12T08:10:09","modified_gmt":"2017-04-12T16:10:09","slug":"news-1112","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/04\/12\/news-1112\/","title":{"rendered":"What is a Zero-Day?"},"content":{"rendered":"<p><strong>Credit to Author: Scott Wilson| Date: Wed, 12 Apr 2017 15:00:03 +0000<\/strong><\/p>\n<p>You have probably heard the term <em>zero-day<\/em> or <em>zero-hour malware<\/em>, but what exactly does it mean?<\/p>\n<p>It&#8217;s simple: it just means the malware is using a software vulnerability for which there is currently no available defense or\u00a0fix. The vulnerability allows the malware to perform actions on your system that should not be permitted, such as running arbitrary code. Such malicious actions can impact the confidentiality, integrity, or availability of your system.<\/p>\n<p>If a vulnerability is known already (i.e. not a zero-day), then chances are the software vendor has patched it, and\/or security software vendors have added defenses against it. So you can protect yourself against known vulnerabilities simply by keeping your software, including your anti-malware defense, up to date. But\u00a0these precautions will not protect you against zero-days.<\/p>\n<p>You can think of the search for new vulnerabilities as a race. When security researchers and good guys find them, they warn the software vendor so the vulnerability can be patched. The best practice (what&#8217;s called &#8220;<a href=\"https:\/\/www.sans.org\/reading-room\/whitepapers\/threats\/define-responsible-disclosure-932\" target=\"_blank\">responsible disclosure<\/a>&#8220;) is to initially do this privately, so the bad guys won&#8217;t get a head&#8217;s up. Once some time has passed, allowing the vulnerability to be patched, the finding is made public. At this time, it might get a <a href=\"https:\/\/cve.mitre.org\/\" target=\"_blank\">CVE number<\/a> from the Mitre Corporation so that any interested party may refer to the vulnerability using a standard name.<\/p>\n<p>Unfortunately, the bad guys are also in this race. They look for vulnerabilities in order to accomplish their ends, which generally involve ripping you off in some way. They try to find undisclosed vulnerabilities\u00a0and create malware that takes advantage of them.<\/p>\n<p>So are we defenseless against zero-day attacks? Happily, the answer is no. Anti-Exploit software like <a href=\"https:\/\/www.malwarebytes.org\/antiexploit\/?utm_source=blog&amp;utm_medium=social\" target=\"_blank\">Malwarebytes Anti-Exploit<\/a>\u00a0can monitor your system for the sorts of actions associated with zero-day exploits and shut them down before they harm your system. If you&#8217;d like to learn more about the technical details, you may read about them in this blog post about <a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2015\/11\/new-malwarebytes-anti-exploit-adds-fingerprinting-detection\/\" target=\"_blank\">how\u00a0Malwarebytes Anti-Exploit works<\/a>.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/04\/what-is-a-zero-day\/\">What is a Zero-Day?<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/04\/what-is-a-zero-day\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Scott Wilson| Date: Wed, 12 Apr 2017 15:00:03 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/04\/what-is-a-zero-day\/' title='What is a Zero-Day?'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2015\/11\/shutterstock_178066031.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>You have probably heard the term zero-day or zero-hour malware, but what exactly does it mean?<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/\" rel=\"category tag\">Cybercrime<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/malware\/\" rel=\"category tag\">Malware<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/malware\/\" rel=\"tag\">malware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/zero-day\/\" rel=\"tag\">zero day<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/zero-day-exploit\/\" rel=\"tag\">zero day exploit<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/zero-hour-malware\/\" rel=\"tag\">zero hour malware<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/04\/what-is-a-zero-day\/' title='What is a Zero-Day?'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/04\/what-is-a-zero-day\/\">What is a Zero-Day?<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[4503,3764,11023,11955,11524],"class_list":["post-7321","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-cybercrime","tag-malware","tag-zero-day-exploit","tag-zero-hour-malware","tag-zero-day"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7321","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=7321"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7321\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=7321"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=7321"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=7321"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}