What Is a Zero Day Attack?

A zero-day attack is a cyber security breach that occurs when a hacker exploits an unpatched or unknown vulnerability for the first time (this can also be referred to as “zero-day vulnerability.”)  Here are some examples of zero-day exploits:

  • A formerly unknown vulnerability that is exploited 
  • Undetected or new malware 
  • A known vulnerability that has never been previously exploited

Critical exposures and vulnerabilities are tracked by watchdog tech organizations and websites to distribute to others. Lists of these exploits are tracked, and then these websites and organizations release patches that will fix them. Once the software patch is released, a “zero-day vulnerability” is no longer considered a zero-day vulnerability.

There is often a gap between a zero-day vulnerability and a zero-day exploit. Sometimes, the vulnerability is known, but exploiting the vulnerability might still be a mystery. Additionally, vulnerabilities can sometimes only be discovered once people figure out how to exploit them. 

Your average anti-malware and antivirus software can only seek out what known vulnerabilities and exploits are out there, and as a result, they do not protect against these threats.

Over 50 percent of all small and mid-sized businesses have been victims of cyber attacks. Download our free Cyber Security Essentials Checklist to help keep your business secure.


Posted in
Free Download

2022 Cyber Security Essentials Checklist

See where your business stands with these 18 critical cyber security controls established by the Center of Internet Security (CIS). Plus see the types of attacks most likely to impact your business.

2022 Aeko Cyber Security Essentials Checklist Promo - Business IT Support

Download Now

Pilot Takeoff Icon

The Aeko Tech

Our goal is to share our IT services knowledge with our region. On our blog, we share the latest cyber security threats and technology news.