What Is a Zero Day Attack?

A zero day attack happens when a hacker takes advantage of an unpatched or previously unknown vulnerability for the first time (also known as a zero day vulnerability).  Some examples of zero day exploits include:

  • A known vulnerability that had never been previously exploited.
  • New or undetected malware.
  • A previously unknown vulnerability that is exploited. 

Critical system vulnerabilities and exposures are tracked by some organizations and websites to distribute to others. They maintain lists of these and then release patches that will fix them. Once the weakness in the software is patched, it is no longer considered a zero day vulnerability.

It is important to note that sometimes, vulnerabilities are only discovered once people figure out how to exploit them. Other times, the vulnerability is known (hypothetically) but it is not known how that vulnerability could possibly be exploited. This is why there is often a gap or delay between when a zero day vulnerability is discovered and when a zero day attack occurs.

Your average antivirus and anti-malware software can only seek out what they know for certain is out there, therefore, they cannot protect against zero day attacks and vulnerabilities.

View all FAQs

What Is a Vulnerability vs an Exploit?

A vulnerability is a weak spot in a system. Vulnerabilities enable hackers and crackers to gain access to a network.  It is virtually impossible to have no weak spots, and not all weak spots exist inside the code itself. The biggest vulnerability for many companies is people.  Human examples of vulnerabilities include a human response…

What Are the Benefits of IT Service Management?

There are multiple benefits associated with IT service management, including: Aside from the benefits above, the day-to-day conveniences of using an ITSM are many. ITSM is not just support via a help desk or a service desk. While an ITSM may support your business via a service desk, the offerings are much broader than that….

What Is IT Service Management?

An IT service management (ITSM) company uses a process to create, deliver, plan, support, implement and operate your IT technology to best serve you and your clients or customers. Their services encompass all technology services and devices: laptops and the applications on them, servers, printers, all software applications, even your passwords. Here’s a list of…


Use our Checklist to Find IT Support

Are you a first-timer to IT support? Maybe you aren’t happy with your current MSP? Our easy-to-follow checklist can guide you through the process of the best IT services provider for your business. It will help you help you outline and define:

  • Your business goals for the next few years
  • The stats that potential MSPs will need to work out a plan for your company
  • The risk areas in your backup and cyber security practices
  • What you expect from your IT support provider
  • And more!
Internos MSP Checklist Promo Wide

Download the Checklist