A zero-day vulnerability, also known as a computer zero day, is a flaw in software, hardware or firmware that is unknown to the party or parties responsible for patching or otherwise fixing the flaw.
Zero day may refer to the vulnerability itself, or it may refer to a zero-day exploit, an attack that uses the zero-day vulnerability to attack vulnerable systems
2. ZERO DAY! EXPLOIT
• A zero-day vulnerability, also known as a computer
zero day, is a flaw in software, hardware or firmware
that is unknown to the party or parties responsible for
patching or otherwise fixing the flaw.
• Zero day may refer to the vulnerability itself, or it
may refer to a zero-day exploit, an attack that uses the
zero-day vulnerability to attack vulnerable systems.
4. WANNACRYATTACK
The WannaCry ransomware attack was a May
2017 worldwide cyberattack by the
WannaCryransomware cryptoworm, which targeted
computers running the Microsoft Windows operating
system by encrypting data and demanding ransom
payments in the Bitcoincryptocurrency.
It propagated through EternalBlue,an exploit in older
Windows systems released by The Shadow Brokers a
few months prior to the attack.
5. HOW DOES ITS WORKS?
• When a computer is infected, the ransomware
typically contacts a central server for the information
it needs to activate, and then begins encrypting files
on the infected computer with that information.
• Once all the files are encrypted, it posts a message
asking for payment to decrypt the files – and
threatens to destroy the information if it doesn’t get
paid, often with a timer attached to ramp up the
pressure.
6. DEFENCIVE RESPONSE
• Microsoft issued a patch for affected versions
of Windows, ensuring that the vulnerability
couldn’t be used to spread malware between
fully updated versions of its operating system.
• But for many reasons, from lack of resources
to a desire to fully test new updates before
pushing them out more widely, organisations
are often slow to install such security updates
on a wide scale.
9. MALWARE
WHAT IS MALWARE?
•Malware, or malicious software, is any program or file
that is harmful to a computer user.
•Malware includes computer viruses, worms, Trojan
horses and spyware.
•These malicious programs can perform a variety of
functions, including stealing, encrypting or deleting
sensitive data, altering or hijacking core computing
functions and monitoring users' computer activity
without their permission.
10. HOW MALWARE WORKS?
• Malware is created by criminals that are very
sophisticated in computer programming before they
install it on the Internet.
•Malware attaches itself to the components of a web
page, pop-up advertisements, toolbars, free stuff that
you download, and games, to name a few.
•When you click on these components, malware sneaks
into your computer.
•Once malware is in your computer it can steal
anything from your music lists to more serious
information like your login passwords, bank account
numbers, and personal information.