• CERTIFICATE
    • Eminent VARs of India
    • Best OEM 2023
  • SYNDICATION
    • AMD
    • DELL TECHNOLOGIES
    • HITACHI
    • LOGMEIN
    • MICROSOFT
    • RIVERBED
    • STORAGECRAFT
    • THALES
  • EVENTS
  • GO DIGITAL
  • INFOGRAPHICS
  • PRESS
    • Press Release PR News Wire
    • Press Release Business Wire
    • GlobeNewsWire
  • SPECIAL
    • WHITE PAPER
    • TECHNOMANIA
    • SME
    • SMART CITY
    • SERVICES
    • EDITOR SPEAK
    • CSR INITIATIVES
    • CHANNEL GURU
    • CHANNEL CHIEF
    • CASE STUDY
  • TECHTREND
    • VAR PANCHAYAT
    • TELECOM
    • SOFTWARE
    • POWER
    • PERIPHERALS
    • NETWORKING
    • LTE
    • CHANNEL BUZZ
    • ASK AN EXPERT
  • SUBSCRIBE
  • Apps
  • Gaming
  • KDS
  • Security
  • Telecom
  • WFH
  • Subscriber to Newsletter
  • April Issue
  • Blogs
  • Vlogs
  • Faceoff AI
    

HOME
NEWS

Why a rise in zero-day attacks is becoming a matter of concern


By VARINDIA - 2022-05-30
Why a rise in zero-day attacks is becoming a matter of concern

As more and more businesses adopt digital practices, prominent attack groups are investing in discovering previously unknown vulnerabilities in software used in their target organizations, which of course is fetching them a higher ROI -

 

The year 2021 has been a year of Zero-day attacks. A zero-day attack refers to a situation when a previously unknown bug or vulnerability in a software gets exploited as part of the cyber-attack and no patch is available yet from the vendor to address it.

 

According to a new report published by Mandiant, 80 zero-days have been exploited in the wild in 2021, which is two times more than the previous record volume in 2019. According to another survey done by MIT Technology Review, 2021 has broken the record for zero-day hacking attacks.

 

“Zero-day attacks have become a severe concern not only for the software vendors and developers but also users and even an entire country. Organisations are getting breached more than ever through their web and API applications,” states Mark Lukie, Systems Engineering Director - Barracuda APAC.

 

“Zero-day vulnerabilities have now become an easy entry point for threat actors,” says Sandeep Peshkar, Senior Vice President Forensics – Arete. “In the last three months, we had 22 bugs, out of which three bugs were used in major attacks, revealed in multiple software, including Google Chrome, Microsoft Windows, and Apple MAC OS.”

 

According to Himanshu Dubey, Senior Director – Engineering Security Labs, Quick Heal Technologies, Cyber Attack is fast becoming a Service model. “Finding new exploitable vulnerabilities in a software is an expensive activity. And hence it is typically limited to well-funded attack groups. In fact on the Darknet, there are groups which focus only on developing exploits for newly discovered vulnerabilities. These exploits are purchased by attack groups, who then use them to attack target organizations or individuals.”

 

There are also state-sponsored espionage groups, as pointed out by Mandiant, that continue to be the primary actors exploiting zero-day vulnerabilities. But it is usually the financially motivated actors that dominate this space.

 

More Software leads to More Software flaws

These zero-day exploitation happening can be for multiple reasons, including security misconfiguration, programming errors, insufficient logging and monitoring, or simply human error.

 

Daniel dos Santos, Head of Research, Forescout Vedere Labs feels that there are two interconnected trends - growth in the total number of vulnerabilities and growth in the number of zero days (found exploited in the wild and not patched by the vendors).

 

“The increasing number of vulnerabilities occur due to the growing size and complexity of the software being used in various connected devices. They occur naturally when developers create software, either because of a lack of knowledge or attention. The more software produced, the higher the chances of increasing vulnerabilities, which is the scenario at present because of many new devices being produced and connected to enterprise networks,” he explains.

 

He also believes that zero-days are increasing as more people are identifying the vulnerabilities. They are either using them directly in launching attacks or (more commonly) selling them to other parties instead of reporting to vendors for a big buck. “There are many active exploit markets where attackers trade new vulnerabilities and exploits used in attacks,” Daniel says.

 

How to prevent a Zero-day attack

Zero-day exploits are not always detected at the point of infection, thus posing a severe cybersecurity hazard. It therefore becomes essential to identify and fix these anomalies whenever detected.

 

The most traditional way of protecting against such vulnerabilities is patching. But that works only after zero-days have been disclosed, and after the patches are released by the vendor. Having an effective cybersecurity strategy in place that relies on limiting the impact of vulnerability exploitation, whether it is a known vulnerability or a zero-day, can be a viable solution. This includes approaches such as segmenting the network to prevent attackers' lateral movement; implementing zero-trust network access.


Yet, a more effective cyber risk protection strategy can be, as pointed out by Mark, to incorporate adequate cyber security awareness training. Since in most attacks employee behaviour is what gets exploited first, educating them about the perils of cyber threats can be a good starting point.

 

Sandeep however suggests that organizations can consider the below key factors to control the impact of a zero-day -

 

Latest bug reports from the community like OSINT and exploitDB to understand the possible risks.

Evaluate the patch in a test environment before implementing it in the production environment.

Always patch the latest vulnerabilities and keep an alert monitor on the tool if a patch is unavailable from the developer for the latest zero-day.

Ensure your operating system is up-to-date and patched regularly, and Harden the network controls.

See What’s Next in Tech With the Fast Forward Newsletter

SECURITY
View All
Zscaler announces AI innovations to its Data Protection Platform
Technology

Zscaler announces AI innovations to its Data Protection Platform

by VARINDIA 2024-05-20
SHIELD to enhance Swiggy’s fraud prevention and detection capabilities
Technology

SHIELD to enhance Swiggy’s fraud prevention and detection capabilities

by VARINDIA 2024-05-20
Axis Communications announces its first thermometric camera designed for Zone/Division 2
Technology

Axis Communications announces its first thermometric camera designed for Zone/Division 2

by VARINDIA 2024-05-20
SOFTWARE
View All
Hitachi Vantara and Veeam announce Global Strategic Alliance
Technology

Hitachi Vantara and Veeam announce Global Strategic Alliance

by VARINDIA 2024-05-16
Adobe launches Acrobat AI Assistant for the Enterprise
Technology

Adobe launches Acrobat AI Assistant for the Enterprise

by VARINDIA 2024-05-11
Oracle Database 23ai offers the power of AI to Enterprise Data and Applications
Technology

Oracle Database 23ai offers the power of AI to Enterprise Data and Applications

by VARINDIA 2024-05-10
START - UP
View All
Data Subject Access Request is an integrated module within ID-REDACT®
Technology

Data Subject Access Request is an integrated module within ID-REDACT®

by VARINDIA 2024-04-30
SiMa.ai Secures $70M Funds from Maverick Capital
Technology

SiMa.ai Secures $70M Funds from Maverick Capital

by VARINDIA 2024-04-05
Sarvam AI collaborates with Microsoft to bring its Indic voice LLM to Azure
Technology

Sarvam AI collaborates with Microsoft to bring its Indic voice LLM to Azure

by VARINDIA 2024-02-08

Tweets From @varindiamag

Nothing to see here - yet

When they Tweet, their Tweets will show up here.

CIO - SPEAK
Automation has the potential to greatly improve efficiency and production

Automation has the potential to greatly improve efficiency and production

by VARINDIA
Various approaches are followed to enhance efficiency, productivity, and cost-effectiveness

Various approaches are followed to enhance efficiency, productivity, and cost-effectiveness

by VARINDIA
Technology can be leveraged in several ways to boost efficiency, productivity and reduce cost

Technology can be leveraged in several ways to boost efficiency, productivity and reduce cost

by VARINDIA
Start-Up and Unicorn Ecosystem
GoDaddy harnesses AI power for new domain name recommendations

GoDaddy harnesses AI power for new domain name recommendations

by VARINDIA
UAE’s du Telecom selects STL as a strategic fibre partner

UAE’s du Telecom selects STL as a strategic fibre partner

by VARINDIA
JLR and Dassault Systèmes extend partnership for All Vehicle Programs worldwide

JLR and Dassault Systèmes extend partnership for All Vehicle Programs worldwide

by VARINDIA
Rapyder partners with AWS to accelerate Generative AI led innovation

Rapyder partners with AWS to accelerate Generative AI led innovation

by VARINDIA
ManageEngine integrates its SIEM solution with Constella Intelligence

ManageEngine integrates its SIEM solution with Constella Intelligence

by VARINDIA
Elastic replaces traditional SIEM game with AI-driven security analytics

Elastic replaces traditional SIEM game with AI-driven security analytics

by VARINDIA
Infosys and ServiceNow to transform customer experiences with generative AI-powered solutions

Infosys and ServiceNow to transform customer experiences with generative AI-powered solutions

by VARINDIA
Crayon Software Experts India inaugurates its ISV Incubation Center in Kolkata

Crayon Software Experts India inaugurates its ISV Incubation Center in Kolkata

by VARINDIA
Dassault Systèmes to accelerate EV charging infrastructure development in India

Dassault Systèmes to accelerate EV charging infrastructure development in India

by VARINDIA
Tech Mahindra and Atento to deliver GenAI powered business transformation services

Tech Mahindra and Atento to deliver GenAI powered business transformation services

by VARINDIA
×

Reproduction in whole or in part in any form or medium without express written permission of Kalinga Digital Media Pvt. Ltd. is prohibited.

  • Distributors & VADs
  • Industry Associations
  • Telco's in India
  • Indian Global Leaders
  • Edit Calendar
  • About Us
  • Advertise Us
  • Contact Us
  • Disclaimer
  • Privacy Statement
  • Sitemap

Copyright varindia.com @1999-2024 - All rights reserved.