DefenseIn many cases, information security threats leverage well known vulnerabilities that a vendor or customers haven't fixed yet. Traditionally, this class of threat is easier to detect and defend against. Modern information security techniques are getting better at detecting zero-day exploits using a variety of techniques that are agnostic to the vulnerability being exploited. For example, a security device might first run code in a sandbox to see if it does anything suspicious such as changing operating system files.
|Overview: Zero Day Vulnerability|
A security flaw in software or hardware that is unreported and unknown to the vendor.