Time to patch: Vulnerabilities exploited in under five minutes?

Once upon a time, there was the . Then came zero-hour vulnerabilities; now, the time to is shrinking, and exploits to vulnerable systems happen in minutes, not days. When announced a zero-day vulnerability was in the Exchange Server, it only took five minutes before the Hafnium group began its scan for vulnerabilities.

As the timeframe to attack shrinks, what can you do to protect a device or from zero-day cyberattacks?

Zero-day recap

To recap, a zero-day vulnerability or zero-day threat is a common phenomenon. If you look at how and hardware are developed, it becomes clear why. Development is a process. It begins with understanding requirements, design of user journeys and the component architecture, developing code etc. Each part of the process is open to flaws built in because of the complexities and interdependencies of the moving parts. Rigorous testing helps but cannot completely eradicate the possibility that a flaw will slip in. Consequently, vulnerabilities are so common that a recent study from security test firm Veracode found at least one security flaw in 76% of .

The name zero-day refers to the fact that the vulnerability is a recent discovery so that

Read More: https://resources.infosecinstitute.com/topic/time-to-patch-vulnerabilities-exploited-in-under-five-minutes/