A zero-day guide for 2020: Recent attacks and advanced preventive techniques

CERT-LatestNews Malware SophosNews ThreatsActivists ThreatsCybercrime VulnerabilitiesAdobe VulnerabilitiesAll VulnerabilitiesApplications VulnerabilitiesCrypto VulnerabilitiesDBMS VulnerabilitiesMicrosoft VulnerabilitiesNetwork
Zero-day vulnerabilities enable threat actors to take advantage of security blindspots. Typically, a zero-day attack involves the identification of zero-day vulnerabilities, creating relevant exploits, identifying vulnerable systems, and planning the attack. The next steps are infiltration and launch.