
What Are Zero Day Attacks?
TechStuff
00:00
The Different Types of Zero Day Vulnerabilities
The hackers do their best to use the gap to do whatever it is they want to do, depending upon the nature of the gap that could include anything from spying on computer activity on a compromised machine to forcing a computer to execute malicious code. So there are lots of different possibilities there. When we hear about zero day vulnerabilities for the first time, it's it comes along with a solution that's being rolled out at the same time because companies typically hold on to that information until they have a solution.
Play episode from 07:36
Transcript


