
Journal of Open Innovation Technology Market and Complexity, Journal Year: 2024, Volume and Issue: unknown, P. 100463 - 100463
Published: Dec. 1, 2024
Language: Английский
Journal of Open Innovation Technology Market and Complexity, Journal Year: 2024, Volume and Issue: unknown, P. 100463 - 100463
Published: Dec. 1, 2024
Language: Английский
Published: July 29, 2024
Zero-day threats are a more severe and constantly developing menace to various participants including large companies, government offices, educational establishments. These entities may contain valuable information essential operations that attract cyber attackers. exploits especially devastating as they target weaknesses an organization’s vendors not even aware of, making them have no protection against them. This paper focuses on the background use of zero-day exploitation structure technologies these complex malware attacks. We examine two notable real-life cases: case ‘HAFNIUM targeting Exchange Servers with exploits’ was investigated by Microsoft 365 Security Threat Intelligence, ‘Log4j vulnerability’ reported National Cyber Centre. cases show critical effects vulnerabilities measures taken combat Additionally, this outlines different strategies can be used prevent attacks help modern technologies. fast patch release, effective IDS/IPS, security model involves constant vigilance behavioral analytics. Thus, studying lifecycle exploits, one enhance organization invisible traditional systems. extensive survey is designed useful in understanding characteristics vulnerabilities, for their mitigation, threat development field cybersecurity. it possible strengthen develop time analyzing previous events predicting potential problems.
Language: Английский
Citations
8Journal of Open Innovation Technology Market and Complexity, Journal Year: 2024, Volume and Issue: unknown, P. 100463 - 100463
Published: Dec. 1, 2024
Language: Английский
Citations
1