zero-day (or
zero-hour)
attack or
threat is a computer threat that tries to exploit
computer application vulnerabilities that are unknown to others, undisclosed to the software vendor, or for which no security fix is available. Zero-day
exploits (actual code that can use a security hole to carry out an attack) are used or shared by attackers before the software vendor knows about the vulnerability.
No comments:
Post a Comment