{"id":1152,"date":"2020-06-29T09:56:00","date_gmt":"2020-06-29T09:56:00","guid":{"rendered":"https:\/\/sectigostore.com\/blog\/?p=1152"},"modified":"2020-11-02T15:55:26","modified_gmt":"2020-11-02T15:55:26","slug":"zero-day-what-is-a-zero-day-attack-exploit-or-vulnerability","status":"publish","type":"post","link":"https:\/\/sectigostore.com\/blog\/zero-day-what-is-a-zero-day-attack-exploit-or-vulnerability\/","title":{"rendered":"Zero Day: What Is a Zero Day Attack, Exploit or Vulnerability?"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Although zero day attacks aren\u2019t the leading cause of data breaches, that doesn\u2019t mean that these types of attacks can\u2019t affect your organization in other ways<\/h2>\n\n\n\n<p>A zero day attack is the sucker punch that you may not see coming.<\/p>\n\n\n\n<p>In the cybersecurity industry, we spend all day talking about the dangers of cyber attacks and how we need to harden our defenses against known attacks. But what can you do to protect yourself against a type of threat that you might not even know exists (or have only recently discovered)?<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is a Zero Day Vulnerability, Zero Day Exploit, or Zero Day Attack?<\/h2>\n\n\n\n<p>Okay, there are a lot of terms that get thrown around relating to <em>zero day ____ \u2014<\/em> zero day vulnerability, zero day exploit, zero day attack, n-day attack, etc<em>.<\/em> But what you may (or may not) realize is that not all of these terms are not interchangeable and have related but different meanings. Let\u2019s break \u2018em down, starting with zero day vulnerabilities, to provide a little clarity about each of the terms.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Zero Day Vulnerability<\/h3>\n\n\n\n<p>A <strong>zero day vulnerability<\/strong> is a chink or weakness in your armor that you may or may not yet know exists. This is something that <em>could be exploited<\/em> in an attack if someone chose to do so, but it\u2019s not actually about the attack itself. A zero day vulnerability may have been publicly disclosed by researchers or vendors, but it\u2019s something that hasn\u2019t yet been patched.<\/p>\n\n\n\n<p>Yeah, it&#8217;s tricky. A zero day vulnerability is something that you can often find in software, firmware, or hardware and can include examples like:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Flaws in operating systems.<\/li><li>Bugs in popular (and lesser known) software applications.<\/li><li>Critical holes in firmware.<\/li><\/ul>\n\n\n\n<p>Now, once an update or patch has been issued for the vulnerability, <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/vulnerabilities-and-exploits\/security-101-zero-day-vulnerabilities-and-exploits\" target=\"_blank\" rel=\"noreferrer noopener\">Trend Micro says that it\u2019s no longer considered a zero day vulnerability<\/a> and instead becomes known as an \u201cn-day\u201d vulnerability. However, some sites and organizations lump zero day attacks and n-day attacks together because they\u2019re both something that threat actors can use to their advantage.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Zero Day Attack (or Zero Day Exploit, Zero Hour Attack, etc.)<\/h3>\n\n\n\n<p>A <strong>zero day attack<\/strong>, on the other hand, is a term that involves taking advantage of that unknown (or publicly disclosed) vulnerability to do something bad.<\/p>\n\n\n\n<p>The <a href=\"https:\/\/csrc.nist.gov\/glossary\/term\/zero_day_attack\" target=\"_blank\" rel=\"noreferrer noopener\">National Institute of Standards and Technology<\/a> (NIST) succinctly defines a zero day attack as \u201can attack that exploits a previously unknown hardware, firmware or software vulnerability.\u201d Basically, it\u2019s an advanced type of cyber attack that occurs when a cybercriminal <em>exploits<\/em> a gap in your security before you have a chance to patch it. (Hence why some people use the terms \u201czero day attack\u201d and \u201czero day exploit\u201d interchangeably.)<\/p>\n\n\n\n<p>Trend Micro also has a great description for these types of exploits or attacks:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p><em>\u201cWhen hackers or threat actors successfully develop and deploy proofs of concept (PoCs) or an actual malware that exploits the vulnerability while the vendor is still working on rolling out a patch (or sometimes, unaware of the vulnerability\u2019s existence), it becomes a zero-day exploit or attack.\u201d<\/em><\/p><\/blockquote>\n\n\n\n<p>Basically, the difference between these terms can be pictured in a very simple way. Imagine that you have a sturdy, reinforced concrete wall protecting your organization. A zero day vulnerability represents the existence of a crack or hole in that barrier that you haven\u2019t noticed. A zero day exploit would be when an enemy actually mounts an attack and comes through that hole or crevasse.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What Makes Zero Day Attacks Such a Threat<\/h2>\n\n\n\n<p><a href=\"https:\/\/www.fireeye.com\/blog\/threat-research\/2020\/04\/zero-day-exploitation-demonstrates-access-to-money-not-skill.html\" target=\"_blank\" rel=\"noreferrer noopener\">FireEye Mandiant Threat Intelligence research<\/a> shows that there were \u201cmore zero-days exploited in 2019 than any of the previous three years.\u201d<\/p>\n\n\n\n<p>It\u2019s virtually impossible to prevent zero day attacks as a whole. Why? Because the definition of a zero day attack is an attack that takes advantage of vulnerabilities that you don\u2019t know exist or are newly discovered. How can you block a punch when you don\u2019t know one\u2019s coming? This is where the people mentioned in the next section can help.<\/p>\n\n\n\n<p>But first, it\u2019s important to note <strong>that the majority of <\/strong><a href=\"https:\/\/sectigostore.com\/blog\/the-7-biggest-data-breaches-of-all-time\/\"><strong>data breaches<\/strong><\/a><strong> don\u2019t result from the exploitation of zero day vulnerabilities.<\/strong> Rather, most breaches (and ransomware attacks) often stem from:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Poor cybersecurity hygiene,<\/li><li>A severe <a href=\"https:\/\/www.darkreading.com\/vulnerabilities---threats\/eternalblue-longevity-underscores-patching-problem\/d\/d-id\/1337233\" target=\"_blank\" rel=\"noreferrer noopener\">failure to implement updates and patches<\/a>, and a<\/li><li>General lack of cyber awareness amongst employees and other end users.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Who Finds Zero Day Exploits<\/h2>\n\n\n\n<p>Is it a little tongue-in-cheek to say \u201canyone?\u201d But, really, finding zero day vulnerabilities and identifying how to exploit them isn\u2019t something that\u2019s limited to just the \u201cgood guys\u201d or the \u201cbad guys.\u201d Even tech-savvy end users can find security issues. <\/p>\n\n\n\n<p>In reality, there are a lot of people who search for zero day vulnerabilities in the wild that can be exploited \u2014 vendors, researchers, bug bounty hunters, individual black\/white\/grey hat hackers, and hacker groups alike. Heck, there\u2019s even a division of Trend Micro \u2014 the Zero Day Initiative (ZDI) \u2014 that\u2019s dedicated to hunting these bugs and releasing security vulnerability advisories!<\/p>\n\n\n\n<p>Bug bounty hunting can also be very profitable. For example, in 2019 alone, <a href=\"https:\/\/www.thezdi.com\/blog\/2020\/1\/30\/looking-back-at-the-zero-day-initiative-in-2019\" target=\"_blank\" rel=\"noreferrer noopener\">ZDI reported<\/a> that it awarded more than $1.5 million in cash and other prizes to bug hunters. The contributions of everyone involved resulted in the release of 1,035 advisories in 2019. Of course, these numbers are likely to change throughout 2020 as the vulnerabilities identified in late 2019 will result in advisories in 2020. But the numbers are less than the 1,450 advisories published in 2018.<\/p>\n\n\n\n<p>According to the FireEye Mandiant Threat Intelligence research we mentioned a little bit ago:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p><em>\u201cWhile not every instance of zero-day exploitation can be attributed to a tracked group, we noted that a wider range of tracked actors appear to have gained access to these capabilities. Furthermore, we noted a significant increase over time in the number of zero-days leveraged by groups suspected to be customers of companies that supply offensive cyber capabilities, as well as an increase in zero-days used against targets in the Middle East, and\/or by groups with suspected ties to this region. Going forward, we are likely to see a greater variety of actors using zero-days, especially as private vendors continue feeding the demand for offensive cyber weapons.\u201d<\/em><\/p><\/blockquote>\n\n\n\n<h2 class=\"wp-block-heading\">How Zero Day Exploits Are Identified<\/h2>\n\n\n\n<p>You\u2019ve likely noticed that vulnerabilities are usually identified by long numbers that start with CVE. (For example, CVE-2020-1234, CVE-2019-12345, etc.) But what do these names actually mean? And, moreover, who\u2019s coming up with them?<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Who\u2019s Responsible for Naming Common Vulnerabilities and Exploits<\/h3>\n\n\n\n<p>There\u2019s a group of organizations that, together, are known as <a href=\"https:\/\/cve.mitre.org\/cve\/cna.html\" target=\"_blank\" rel=\"noreferrer noopener\">CVE Numbering Authorities<\/a> (CNAs). These organizations have been given the ability to metaphorically rubber stamp common vulnerabilities and exposures (CVEs) by assigning them ID numbers. These numbers are used to identify the vulnerabilities in their first-time public announcements and are used by a variety of individuals including vendors, researchers, and vulnerability disclosers.<\/p>\n\n\n\n<p>As of May 28, 2020, the MITRE website reports that there are 128 organizations from 21 countries that are CNAs. The overwhelming majority of them \u2014 77 \u2014 exist within the United States alone.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">What\u2019s in a Name: Let\u2019s Take a Closer Look at CVE Naming Conventions<\/h3>\n\n\n\n<p>Let\u2019s break down the naming convention of these vulnerabilities for CVE-2020-1234:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>CVE stands for \u201ccommon vulnerability and exposure\u201d<\/li><li>The next four-number component refers to the year in which the vulnerability is discovered<\/li><li>The next set of numbers, consisting of four or more digits, identifies the specific vulnerability<\/li><\/ul>\n\n\n\n<p>CVE products include:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Software (both closed and open source),<\/li><li>Hardware,<\/li><li>Cloud and software as a service offering, and\/or<\/li><li>Protocols, standards, and APIs.<\/li><\/ul>\n\n\n\n<p>If it\u2019s just one product that\u2019s affected, it\u2019s considered a single vulnerability. If multiple products have vulnerabilities, then they would be considered separate vulnerabilities However, many products nowadays tend to share code \u2014 in this case, if multiple products share the same vulnerable code, that means that they\u2019d all be lumped under one shared vulnerability ID.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"823\" height=\"476\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/06\/zero-day-vulnerabilities-and-exploits-shared-code.png\" alt=\"A screenshot of branch chart that shows vulnerabilities and how they are assigned CVEs\" class=\"wp-image-1153 addshadow\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/06\/zero-day-vulnerabilities-and-exploits-shared-code.png 823w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/06\/zero-day-vulnerabilities-and-exploits-shared-code-300x174.png 300w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/06\/zero-day-vulnerabilities-and-exploits-shared-code-560x324.png 560w\" sizes=\"auto, (max-width: 823px) 100vw, 823px\" \/><figcaption>Image source: Screenshot courtesy of <a href=\"https:\/\/cve.mitre.org\/cve\/cna.html\" target=\"_blank\" rel=\"noreferrer noopener\">MITRE\u2019s Assigning CVE IDs video presentation<\/a><\/figcaption><\/figure><\/div>\n\n\n\n<p>Of course, if a CNA isn\u2019t sure about whether multiple products share the same code, it\u2019s best to err on the side of caution and list them as separate vulnerabilities.&nbsp;&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Where to Find the List of Known CVEs<\/h3>\n\n\n\n<p>You can search the <a href=\"https:\/\/cve.mitre.org\/cve\/search_cve_list.html\" target=\"_blank\" rel=\"noreferrer noopener\">CVE list on the MITRE website<\/a> for any specific CVE entries or IDs. You can also find CVEs on the <a href=\"https:\/\/nvd.nist.gov\" target=\"_blank\" rel=\"noreferrer noopener\">National Vulnerability Database<\/a> (NVD) page of the NIST website.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Examples of New or Recent Zero Day Vulnerabilities<\/h2>\n\n\n\n<p>Now that you know what a zero day vulnerability is and how it works, let\u2019s explore three examples of some critical zero day vulnerabilities.<strong><\/strong><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. Windows 10 Vulnerability Spoofs Authentication in Executables<\/h3>\n\n\n\n<p>Earlier this year, the <a href=\"https:\/\/www.thesslstore.com\/blog\/nsa-microsoft-releases-patch-to-fix-latest-windows-10-vulnerability\/\">NSA disclosed a critical vulnerability<\/a> (<a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0601\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-0601<\/a>) within their public key infrastructure that would affect the cryptographic function of 32- and 64-bit Windows 10 operating systems and specific versions of Windows Server.<\/p>\n\n\n\n<p><a rel=\"noreferrer noopener\" href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-0601\" target=\"_blank\">This specific type of vulnerability<\/a> exists in the process of how Windows CryptoAPI validates elliptic curve cryptography (ECC). The risk here is that a bad guy could use a spoofed code signing certificate to exploit this vulnerability and sign an executable to make it believable to unsuspecting users. Of course, attackers can\u2019t pull this off entirely on their own \u2014 they\u2019d need a victim to actually engage with it to activate it.<\/p>\n\n\n\n<p>The end result? The signed file would appear to come from a trusted and reputable source. Thankfully, Microsoft was quick to move forward with putting out an advisory and patching the vulnerability.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. Netgear Zero Day Firmware Vulnerability Leaves Routers Open to Takeover Attacks<\/h3>\n\n\n\n<p>In January 2020, ZDI researchers informed Netgear about an unpatched zero day vulnerability in the firmware of their routers. Initially thought to affect only the R7000 router series, it was later discovered by <a href=\"https:\/\/blog.grimm-co.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Grimm<\/a> cybersecurity firm researcher Adam Nichols to affect \u201c79 Netgear devices and 758 firmware images that included a vulnerable copy of the web server.\u201d<\/p>\n\n\n\n<p>In his <a href=\"https:\/\/blog.grimm-co.com\/2020\/06\/soho-device-exploitation.html\" target=\"_blank\" rel=\"noreferrer noopener\">blog post on SOHO device exploitation<\/a>, Nichols says about the vulnerability:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p><em>\u201cIn most modern software, this vulnerability would be unexploitable. Modern software typically contains&nbsp;<\/em><a href=\"https:\/\/en.wikipedia.org\/wiki\/Stack_buffer_overflow#Stack_canaries\" target=\"_blank\" rel=\"noreferrer noopener\"><em>stack cookies<\/em><\/a><em>&nbsp;which would prevent exploitation. However, the R7000 does not use stack cookies. In fact, of all of the Netgear products which share a common codebase, only the D8500 firmware version 1.0.3.29 and the R6300v2 firmware versions 1.0.4.12-1.0.4.20 use stack cookies. However, later versions of the D8500 and R6300v2 stopped using stack cookies, making this vulnerability once again exploitable. This is just one more example of how SOHO device security has fallen behind as compared to other modern software.\u201d<\/em><\/p><\/blockquote>\n\n\n\n<p><a href=\"https:\/\/kb.netgear.com\/000061982\/Security-Advisory-for-Multiple-Vulnerabilities-on-Some-Routers-Mobile-Routers-Modems-Gateways-and-Extenders\" target=\"_blank\" rel=\"noreferrer noopener\">Netgear recently released hotfixes<\/a> for some of their routers to address some of the vulnerabilities. However, they also state that \u201cUntil a firmware fix is available for your product, NETGEAR recommends that you follow the workarounds and best practices in this advisory.\u201d<\/p>\n\n\n\n<p>Here\u2019s a breakdown of the timeline from when Netgear was first notified until the date when the vulnerability advisory was made public:<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"499\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/06\/netgear-zero-day-vulnerability-1024x499.png\" alt=\"Screenshot of the information about the Netgear zero day vulnerabilities from the ZDI website.\" class=\"wp-image-1154 addshadow\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/06\/netgear-zero-day-vulnerability-1024x499.png 1024w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/06\/netgear-zero-day-vulnerability-300x146.png 300w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/06\/netgear-zero-day-vulnerability-560x273.png 560w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/06\/netgear-zero-day-vulnerability-940x458.png 940w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/06\/netgear-zero-day-vulnerability.png 1428w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption>Image source: <a rel=\"noreferrer noopener\" href=\"https:\/\/www.zerodayinitiative.com\/advisories\/ZDI-20-712\/\" target=\"_blank\">Zero Day Initiative<\/a><\/figcaption><\/figure><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">3. Zyxel Vulnerabilities Within Firmware for NAS and Firewall Solutions<\/h3>\n\n\n\n<p>In February 2020, Brian Krebs of Krebs on Security reported that both <a href=\"https:\/\/krebsonsecurity.com\/2020\/02\/zyxel-0day-affects-its-firewall-products-too\/\" target=\"_blank\" rel=\"noreferrer noopener\">network attached storage (NAS) devices and firewalls from Zyxel<\/a> had critical flaws that resulted in zero day vulnerabilities.<\/p>\n\n\n\n<p>The NAS flaw, labeled <a href=\"https:\/\/www.kb.cert.org\/vuls\/id\/498544\/\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2020-9054<\/a>, took advantage of a pre-authentication command injection vulnerability within specific firmware versions. Essentially, the flaw would allow hackers to remotely execute arbitrary code on affected devices by using an OS command injection.<\/p>\n\n\n\n<p>According to Zyxel\u2019s <a href=\"https:\/\/www.zyxel.com\/support\/remote-code-execution-vulnerability-of-NAS-products.shtml\" target=\"_blank\" rel=\"noreferrer noopener\">updated security advisory<\/a>, the exploit affected UTM, ATP and VPN firewalls running firmware versions ZLD V4.35 Patch 0 through ZLD V4.35 Patch 2. The firmware versions prior to the ZLD V4.35 Patch 0 remained unaffected.<\/p>\n\n\n\n<p>The problem, however, would be that while they had patches available for affected models that fell within warranty and support periods, they weren\u2019t as helpful with legacy systems:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p><em>\u201cFor affected NAS products that reached end-of-support in 2016 or earlier, firmware updates are no longer provided. We strongly recommend that users follow the workaround procedure [\u2026] to remediate the vulnerability.\u201d<\/em><\/p><\/blockquote>\n\n\n\n<h2 class=\"wp-block-heading\">3 Real World Zero Day Attack Examples<\/h2>\n\n\n\n<p>Now that you\u2019ve seen some examples of zero day vulnerabilities, let\u2019s take a look at some of the biggest zero day attacks that have been carried out in recent years:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. Hackers Exploit WhatsApp Vulnerability to Distribute Spyware<\/h3>\n\n\n\n<p>This critical zero day vulnerability, known as <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2019-3568\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2019-3568<\/a>, was discovered as being used to facilitate the spread of malware to specific target devices in 2019. Basically, it was a buffer overflow vulnerability that was used to distribute spyware via affected versions of the WhatsApp mobile app for Windows, iOS and Android. this exploit allowed them to remotely execute code that they\u2019d send to those target phone numbers via RTCP packets.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.documentcloud.org\/documents\/6532395-WhatsApp-complaint.html\" target=\"_blank\" rel=\"noreferrer noopener\">In a federal lawsuit<\/a> against Israeli mobile surveillance firm NSO Group, WhatsApp claimed that the group exploited an audio-calling vulnerability to send government-grade spyware to \u201capproximately 1,400 mobile phones and devices.\u201d The idea here is that since WhatsApp is end-to-end encrypted, they had to find a workaround to obtain message data. So, instead of trying to hack the messages directly, they\u2019d go after the devices instead.<\/p>\n\n\n\n<p>Although WhatsApp was quick to patch the vulnerability, <a href=\"https:\/\/www.forbes.com\/sites\/zakdoffman\/2019\/12\/17\/whatsapp-update-warning-as-new-app-killing-message-confirmed-heres-what-you-need-to-know\/#70edce655ad1\" target=\"_blank\" rel=\"noreferrer noopener\">others followed behind it<\/a>, making 2019 a really tough year for the Facebook-owned company.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. Hackers Use Microsoft Windows Vulnerability to Carry Out Government Espionage in Europe<\/h3>\n\n\n\n<p>Buhtrap, a hacker group that\u2019s known for cyber bank robbery initiatives, exploited a Windows OS vulnerability to <a href=\"https:\/\/www.securityweek.com\/buhtrap-group-used-windows-zero-day-government-attack\" target=\"_blank\" rel=\"noreferrer noopener\">carry out zero day attacks<\/a> against Eastern European government institutions in June 2019. <a href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2019\/07\/12\/confirmed-microsoft-windows-zero-day-exploit-used-in-government-espionage-operation\/\" target=\"_blank\" rel=\"noreferrer noopener\">Cybersecurity writer Davey Winder<\/a> explains that the hacker group carried out their attack by exploiting a vulnerability that affected older versions of Windows OSes and Windows Server 2008.<\/p>\n\n\n\n<p>The flaw, identified as <a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1132\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2019-1132<\/a>, was a privilege escalation issue relating to Win32k memory objects. It was one of the vulnerabilities that Microsoft addressed in a July 9, 2019 patch Tuesday update.<\/p>\n\n\n\n<p>According to a <a href=\"https:\/\/www.securityweek.com\/buhtrap-group-used-windows-zero-day-government-attack\" target=\"_blank\" rel=\"noreferrer noopener\">report by SecurityWeek<\/a>:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p><em>\u201cThe group used decoy documents to deliver a piece of malware designed to steal passwords from email clients and browsers, and send them to a command and control (C&amp;C) server. The malware also gave attackers full access to the compromised device.\u201d<\/em><\/p><\/blockquote>\n\n\n\n<h3 class=\"wp-block-heading\">3. \u2018EternalBlue\u2019 Exploit Affected Hundreds of Thousands of Devices Worldwide<\/h3>\n\n\n\n<p>2017 marked a bad year for IT administrators and businesses worldwide. It was the year in which EternalBlue, one of several exploits that was developed by the NSA and released by a hacker collective known as the Shadow Brokers, was deployed as part of the WannaCry ransomware attacks.<\/p>\n\n\n\n<p>Of course, the exploit was used in other malware and <a href=\"https:\/\/sectigostore.com\/blog\/42-cyber-attack-statistics-by-year-a-look-at-the-last-decade\/\">cyber attacks<\/a> (TrickBot, WannaMine, Coin Miner, etc.), but WannaCry was one of the first and best known variants because it\u2019s thought to have affected more than 200,000 computers in more than 100 countries.<\/p>\n\n\n\n<p>The way the zero day exploit worked was that it allow hackers to <a href=\"https:\/\/www.cisecurity.org\/wp-content\/uploads\/2019\/01\/Security-Primer-EternalBlue.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">remotely exploit a software vulnerability<\/a> that existed within Microsoft\u2019s Windows OS server message block (SMB) version 1 protocol. This access would allow them to compromise the entire network that an infected device was connected to, along with any devices associated with the network.<\/p>\n\n\n\n<p>Part of the reason WannaCry was so successful as a cyber attack is that although Microsoft released a patch for EternalBlue the month before the WannaCry attacks began, many businesses failed to deploy the patch on their systems. One such example was the United Kingdom\u2019s National Health Service (NHS).<\/p>\n\n\n\n<p>The UK\u2019s National Audit Office <a href=\"https:\/\/www.nao.org.uk\/wp-content\/uploads\/2017\/10\/Investigation-WannaCry-cyber-attack-and-the-NHS.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">reports that the NHS was warned about security issues<\/a> relating to legacy systems in advance of the WannaCry attacks but lagged in their response. <a href=\"https:\/\/www.nao.org.uk\/report\/investigation-wannacry-cyber-attack-and-the-nhs\/\" target=\"_blank\" rel=\"noreferrer noopener\">According to Amyas Morse<\/a>, the head of the NAO:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p><em>\u201cThe WannaCry cyber attack had potentially serious implications for the NHS and its ability to provide care to patients. It was a relatively unsophisticated attack and could have been prevented by the NHS following basic IT security best practice. There are more sophisticated cyber threats out there than WannaCry so the Department and the NHS need to get their act together to ensure the NHS is better protected against future attacks.\u201d<\/em><\/p><\/blockquote>\n\n\n\n<h3 class=\"wp-block-heading\">4. Stuxnet Wreaks Havoc on Iranian Nuclear Facility Before Going Public<\/h3>\n\n\n\n<p>We\u2019ll conclude this list by talking about the other best-known zero day exploit \u2014 <a href=\"https:\/\/www.wired.com\/2014\/11\/countdown-to-zero-day-stuxnet\/\" target=\"_blank\" rel=\"noreferrer noopener\">Stuxnet<\/a>. The Stuxnet exploit <a href=\"https:\/\/spectrum.ieee.org\/telecom\/security\/the-real-story-of-stuxnet\" target=\"_blank\" rel=\"noreferrer noopener\">wreaked havoc in Iranian nuclear facilities<\/a> by affecting its uranium enriching centrifuges back in the late 2000s before going public.<\/p>\n\n\n\n<p>The sophisticated computer worm, <a href=\"https:\/\/arstechnica.com\/tech-policy\/2012\/06\/confirmed-us-israel-created-stuxnet-lost-control-of-it\/\" target=\"_blank\" rel=\"noreferrer noopener\">developed by U.S. and Israeli governments<\/a>, eventually spread to devices in 115 countries, according to <a href=\"https:\/\/www.zdnet.com\/article\/stuxnet-infections-spread-to-115-countries\/\" target=\"_blank\" rel=\"noreferrer noopener\">report from ZDNet<\/a>. Although Stuxnet is, by modern day standards, considered old news, this worm is still relevant in the sense that it was the first known publicly known type of cyber attack to <a href=\"https:\/\/www.welivesecurity.com\/2017\/06\/16\/seven-years-stuxnet-industrial-systems-security-spotlight\/\" target=\"_blank\" rel=\"noreferrer noopener\">target industrial systems<\/a> around the world.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Final Thoughts on Zero Day Vulnerabilities &amp; Attacks (and How to Protect Your Organization Against Them)<\/h2>\n\n\n\n<p>Although we\u2019ve certainly seen enough high-impact zero day attacks that should cause the IT and security community to sit up and take notice, the fact is that patching remains a big issue. This is true for many businesses and organizations alike regardless of their sizes or locations. &nbsp;<\/p>\n\n\n\n<p>But patching isn\u2019t the only thing that businesses, governments, and organizations can do to protect their IT infrastructure, networks, and data:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Have IT disaster response and recovery plans in place.<\/li><li>Identify and train key team members so they understand their roles and responsibilities.<\/li><li>Purge legacy systems and technologies.<\/li><li>Regularly back up your data and follow the 3-2-1 backup rule.<\/li><li>Train your employees to be cyber aware so they can identify common threats and know how to safely respond to them.<\/li><li>Use continuous monitoring solutions to identify unusual activity and advanced persistent threats.<\/li><li>Regularly assess your network and other cybersecurity defenses to identify vulnerabilities.<\/li><li>Use multi-layered cybersecurity defenses.<\/li><\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Although zero day attacks aren\u2019t the leading cause of data breaches, that doesn\u2019t mean that these types of attacks can\u2019t affect your organization in other ways.<\/p>\n","protected":false},"author":8,"featured_media":1155,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13],"tags":[91,90],"class_list":["post-1152","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","tag-zero-day-attack","tag-zero-day-vulnerability","post-with-tags"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Zero Day: What Is a Zero Day Attack, Exploit or Vulnerability?<\/title>\n<meta name=\"description\" content=\"Zero day vulnerabilitiy, zero day attack, &amp; zero day exploit. We&#039;ll break down the meanings of these terms, how they work, and how to protect yourself.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sectigostore.com\/blog\/zero-day-what-is-a-zero-day-attack-exploit-or-vulnerability\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Zero Day: What Is a Zero Day Attack, Exploit or Vulnerability?\" \/>\n<meta property=\"og:description\" content=\"Zero day vulnerabilitiy, zero day attack, &amp; zero day exploit. We&#039;ll break down the meanings of these terms, how they work, and how to protect yourself.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sectigostore.com\/blog\/zero-day-what-is-a-zero-day-attack-exploit-or-vulnerability\/\" \/>\n<meta property=\"og:site_name\" content=\"InfoSec Insights\" \/>\n<meta property=\"article:published_time\" content=\"2020-06-29T09:56:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-11-02T15:55:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/06\/zero-day-vulnerability-attack-exploit.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Casey Crane\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Casey Crane\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"15 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/zero-day-what-is-a-zero-day-attack-exploit-or-vulnerability\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/zero-day-what-is-a-zero-day-attack-exploit-or-vulnerability\\\/\"},\"author\":{\"name\":\"Casey Crane\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/559abd5fa4d9d651eaf18d9b9e91a64c\"},\"headline\":\"Zero Day: What Is a Zero Day Attack, Exploit or Vulnerability?\",\"datePublished\":\"2020-06-29T09:56:00+00:00\",\"dateModified\":\"2020-11-02T15:55:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/zero-day-what-is-a-zero-day-attack-exploit-or-vulnerability\\\/\"},\"wordCount\":2963,\"image\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/zero-day-what-is-a-zero-day-attack-exploit-or-vulnerability\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/zero-day-vulnerability-attack-exploit.jpg\",\"keywords\":[\"Zero Day Attack\",\"Zero Day Vulnerability\"],\"articleSection\":[\"Cyber Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/zero-day-what-is-a-zero-day-attack-exploit-or-vulnerability\\\/\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/zero-day-what-is-a-zero-day-attack-exploit-or-vulnerability\\\/\",\"name\":\"Zero Day: What Is a Zero Day Attack, Exploit or Vulnerability?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/zero-day-what-is-a-zero-day-attack-exploit-or-vulnerability\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/zero-day-what-is-a-zero-day-attack-exploit-or-vulnerability\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/zero-day-vulnerability-attack-exploit.jpg\",\"datePublished\":\"2020-06-29T09:56:00+00:00\",\"dateModified\":\"2020-11-02T15:55:26+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/559abd5fa4d9d651eaf18d9b9e91a64c\"},\"description\":\"Zero day vulnerabilitiy, zero day attack, & zero day exploit. We'll break down the meanings of these terms, how they work, and how to protect yourself.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/zero-day-what-is-a-zero-day-attack-exploit-or-vulnerability\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sectigostore.com\\\/blog\\\/zero-day-what-is-a-zero-day-attack-exploit-or-vulnerability\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/zero-day-what-is-a-zero-day-attack-exploit-or-vulnerability\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/zero-day-vulnerability-attack-exploit.jpg\",\"contentUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/zero-day-vulnerability-attack-exploit.jpg\",\"width\":1600,\"height\":1000,\"caption\":\"ZERO DAY rays volume light concept 3d illustration\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/zero-day-what-is-a-zero-day-attack-exploit-or-vulnerability\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Zero Day: What Is a Zero Day Attack, Exploit or Vulnerability?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/\",\"name\":\"InfoSec Insights\",\"description\":\"SectigoStore.com Blog\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/559abd5fa4d9d651eaf18d9b9e91a64c\",\"name\":\"Casey Crane\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c18d819d34a1995e91a4aa7518e9048df7856f336a1ede2262a572db7b1c2506?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c18d819d34a1995e91a4aa7518e9048df7856f336a1ede2262a572db7b1c2506?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c18d819d34a1995e91a4aa7518e9048df7856f336a1ede2262a572db7b1c2506?s=96&d=mm&r=g\",\"caption\":\"Casey Crane\"},\"description\":\"Casey is a writer and editor with a background in journalism, marketing, PR and communications. She has written about cyber security and information technology for several industry publications, including InfoSec Insights, Hashed Out, Experfy, HackerNoon, and Cybercrime Magazine.\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Zero Day: What Is a Zero Day Attack, Exploit or Vulnerability?","description":"Zero day vulnerabilitiy, zero day attack, & zero day exploit. We'll break down the meanings of these terms, how they work, and how to protect yourself.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sectigostore.com\/blog\/zero-day-what-is-a-zero-day-attack-exploit-or-vulnerability\/","og_locale":"en_US","og_type":"article","og_title":"Zero Day: What Is a Zero Day Attack, Exploit or Vulnerability?","og_description":"Zero day vulnerabilitiy, zero day attack, & zero day exploit. We'll break down the meanings of these terms, how they work, and how to protect yourself.","og_url":"https:\/\/sectigostore.com\/blog\/zero-day-what-is-a-zero-day-attack-exploit-or-vulnerability\/","og_site_name":"InfoSec Insights","article_published_time":"2020-06-29T09:56:00+00:00","article_modified_time":"2020-11-02T15:55:26+00:00","og_image":[{"width":1600,"height":1000,"url":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/06\/zero-day-vulnerability-attack-exploit.jpg","type":"image\/jpeg"}],"author":"Casey Crane","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Casey Crane","Est. reading time":"15 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sectigostore.com\/blog\/zero-day-what-is-a-zero-day-attack-exploit-or-vulnerability\/#article","isPartOf":{"@id":"https:\/\/sectigostore.com\/blog\/zero-day-what-is-a-zero-day-attack-exploit-or-vulnerability\/"},"author":{"name":"Casey Crane","@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/559abd5fa4d9d651eaf18d9b9e91a64c"},"headline":"Zero Day: What Is a Zero Day Attack, Exploit or Vulnerability?","datePublished":"2020-06-29T09:56:00+00:00","dateModified":"2020-11-02T15:55:26+00:00","mainEntityOfPage":{"@id":"https:\/\/sectigostore.com\/blog\/zero-day-what-is-a-zero-day-attack-exploit-or-vulnerability\/"},"wordCount":2963,"image":{"@id":"https:\/\/sectigostore.com\/blog\/zero-day-what-is-a-zero-day-attack-exploit-or-vulnerability\/#primaryimage"},"thumbnailUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/06\/zero-day-vulnerability-attack-exploit.jpg","keywords":["Zero Day Attack","Zero Day Vulnerability"],"articleSection":["Cyber Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sectigostore.com\/blog\/zero-day-what-is-a-zero-day-attack-exploit-or-vulnerability\/","url":"https:\/\/sectigostore.com\/blog\/zero-day-what-is-a-zero-day-attack-exploit-or-vulnerability\/","name":"Zero Day: What Is a Zero Day Attack, Exploit or Vulnerability?","isPartOf":{"@id":"https:\/\/sectigostore.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sectigostore.com\/blog\/zero-day-what-is-a-zero-day-attack-exploit-or-vulnerability\/#primaryimage"},"image":{"@id":"https:\/\/sectigostore.com\/blog\/zero-day-what-is-a-zero-day-attack-exploit-or-vulnerability\/#primaryimage"},"thumbnailUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/06\/zero-day-vulnerability-attack-exploit.jpg","datePublished":"2020-06-29T09:56:00+00:00","dateModified":"2020-11-02T15:55:26+00:00","author":{"@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/559abd5fa4d9d651eaf18d9b9e91a64c"},"description":"Zero day vulnerabilitiy, zero day attack, & zero day exploit. We'll break down the meanings of these terms, how they work, and how to protect yourself.","breadcrumb":{"@id":"https:\/\/sectigostore.com\/blog\/zero-day-what-is-a-zero-day-attack-exploit-or-vulnerability\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sectigostore.com\/blog\/zero-day-what-is-a-zero-day-attack-exploit-or-vulnerability\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sectigostore.com\/blog\/zero-day-what-is-a-zero-day-attack-exploit-or-vulnerability\/#primaryimage","url":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/06\/zero-day-vulnerability-attack-exploit.jpg","contentUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/06\/zero-day-vulnerability-attack-exploit.jpg","width":1600,"height":1000,"caption":"ZERO DAY rays volume light concept 3d illustration"},{"@type":"BreadcrumbList","@id":"https:\/\/sectigostore.com\/blog\/zero-day-what-is-a-zero-day-attack-exploit-or-vulnerability\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sectigostore.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Zero Day: What Is a Zero Day Attack, Exploit or Vulnerability?"}]},{"@type":"WebSite","@id":"https:\/\/sectigostore.com\/blog\/#website","url":"https:\/\/sectigostore.com\/blog\/","name":"InfoSec Insights","description":"SectigoStore.com Blog","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sectigostore.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/559abd5fa4d9d651eaf18d9b9e91a64c","name":"Casey Crane","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c18d819d34a1995e91a4aa7518e9048df7856f336a1ede2262a572db7b1c2506?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c18d819d34a1995e91a4aa7518e9048df7856f336a1ede2262a572db7b1c2506?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c18d819d34a1995e91a4aa7518e9048df7856f336a1ede2262a572db7b1c2506?s=96&d=mm&r=g","caption":"Casey Crane"},"description":"Casey is a writer and editor with a background in journalism, marketing, PR and communications. She has written about cyber security and information technology for several industry publications, including InfoSec Insights, Hashed Out, Experfy, HackerNoon, and Cybercrime Magazine."}]}},"_links":{"self":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/1152","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/comments?post=1152"}],"version-history":[{"count":5,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/1152\/revisions"}],"predecessor-version":[{"id":1685,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/1152\/revisions\/1685"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/media\/1155"}],"wp:attachment":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/media?parent=1152"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/categories?post=1152"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/tags?post=1152"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}