
Journal of Open Innovation Technology Market and Complexity, Год журнала: 2024, Номер unknown, С. 100463 - 100463
Опубликована: Дек. 1, 2024
Язык: Английский
Journal of Open Innovation Technology Market and Complexity, Год журнала: 2024, Номер unknown, С. 100463 - 100463
Опубликована: Дек. 1, 2024
Язык: Английский
Опубликована: Июль 29, 2024
Zero-day threats are a more severe and constantly developing menace to various participants including large companies, government offices, educational establishments. These entities may contain valuable information essential operations that attract cyber attackers. exploits especially devastating as they target weaknesses an organization’s vendors not even aware of, making them have no protection against them. This paper focuses on the background use of zero-day exploitation structure technologies these complex malware attacks. We examine two notable real-life cases: case ‘HAFNIUM targeting Exchange Servers with exploits’ was investigated by Microsoft 365 Security Threat Intelligence, ‘Log4j vulnerability’ reported National Cyber Centre. cases show critical effects vulnerabilities measures taken combat Additionally, this outlines different strategies can be used prevent attacks help modern technologies. fast patch release, effective IDS/IPS, security model involves constant vigilance behavioral analytics. Thus, studying lifecycle exploits, one enhance organization invisible traditional systems. extensive survey is designed useful in understanding characteristics vulnerabilities, for their mitigation, threat development field cybersecurity. it possible strengthen develop time analyzing previous events predicting potential problems.
Язык: Английский
Процитировано
8Journal of Open Innovation Technology Market and Complexity, Год журнала: 2024, Номер unknown, С. 100463 - 100463
Опубликована: Дек. 1, 2024
Язык: Английский
Процитировано
1