Cyber attacks

Zero-Day Attacks  

Always keep track of the incoming and outgoing network traffic

Think about a scenario where even the cybersecurity experts are unaware of software vulnerability and an attack they are about to encounter. Yes, that is what we call a zero-day attack. 

Zero-day attacks exploit unpatched vulnerabilities in software. Once the exploit is on the run, developing a patch can take hours or months. 

So why is it called a Zero-Day attack? 

It accounts for the number of days the cybersecurity professional is aware of the vulnerability. Until the vulnerability gets patched, the attack will be considered a Zero-Day attack. Once reported, these attacks will be added to the Common Vulnerabilities and Exposures (CVE) list under zero-day attacks.

Is it possible to detect the attack beforehand? 

No. Only the vulnerability can be detected and fixed. Once cybercriminals are aware of a flaw, they will exploit a vulnerability and use it to their advantage. Cybercriminals may also sell this payload to the dark web or keep it on hold until the right moment comes for them to execute the plan.

 What is the agenda behind such attacks? 

  1. An organization with wrong intentions may want to disrupt the services of its competitor.
  2. Extract sensitive information about a business tycoon, politician, or government official. 
  3. Target every user on the internet by exploiting a flaw in any popular software or application.

 Top zero-day attacks of 2021


Apache Log4j, a software library commonly used by software developers, had a Remote code execution (RCE) and Denial of Service (DoS) vulnerability that the attackers exploited. Log4j was deemed the worst zero-day attack of 2021.

Apache released a new version of Log4j. However, exploitation of newer vulnerabilities on Log4j continues.


SolarWinds, an IT Infrastructure company, was targeted by a zero-day attack in July 2021. The attack was aimed at specific customers of SolarWinds. The flaw in the Serv-U (till version 15.2.3 HF1) was immediately patched after Microsoft alerted them about the attack. The exploit had the potential for privilege escalation and could have modified the data stored inside SolarWinds’ customer files.


SonicWall, a private company that sells networking products was attacked due to three unknown vulnerabilities in its Email Security (ES) product. The threat actor leveraged these vulnerabilities to install a backdoor, access files, and emails, and move laterally into the victim organization’s network. A patch was released within a few days after Mandiant Managed Defense reported the flaw in the product.

What can we do to mitigate zero-day attacks?

Always make it a point to test the software frequently. 

Be quick with patching the bugs. 

Software developers must always keep track of incoming and outgoing network traffic.

Stay cautious. Digital power is dominating the world, with zero-day attacks inclined to increase in the future years. Any suspicious activity on the internet should be dealt with utmost vigilance.