A-Z Popular Blog Security Search »
Information Security
Related Guides

What is Zero-day?

 , updated on
A zero-day vulnerability is a security flaw in software or hardware that is unreported and unknown to the vendor.


In many cases, information security threats leverage well known vulnerabilities that a vendor or customers haven't fixed yet. Traditionally, this class of threat is easier to detect and defend against.
Modern information security techniques are getting better at detecting zero-day exploits using a variety of techniques that are agnostic to the vulnerability being exploited. For example, a security device might first run code in a sandbox to see if it does anything suspicious such as changing operating system files.
Overview: Zero Day Vulnerability
A security flaw in software or hardware that is unreported and unknown to the vendor.
Related Concepts

Information Security

This is the complete list of articles we have written about information security.
Audit Trail
Canary Trap
Confidential Information
Critical Infrastructure
Cryptographic Keys
Cryptographic Salt
Cybersecurity Risk
Data Breach
Data Remanence
Data Room
Data Security
Deep Magic
Defense In Depth
Digital Identity
Failure Of Imagination
Incident Response
IoT Security
Key Stretching
Network Security
Operations Security
Overlay Network
Password Entropy
Password Fatigue
Proof Of Work
Secure Code Review
Security As A Service
Security Controls
More ...
If you enjoyed this page, please consider bookmarking Simplicable.

Security vs Privacy

The relationship between security and privacy.


An overview of technology hardening.

Deep Magic

An overview of deep magic, a technology term.

Defense In Depth

An overview of defense In depth.

Encryption Examples

A definition of encryption with examples.

Canary Trap

A definition of canary trap with an example.


A definition of honeypot with examples.

Security Through Obscurity

A definition of security through obscurity with an example.


A definition of token with examples.


A definition of backdoor with examples.

Data Backup

Several data backup techniques compared.

Sandbox Definition

An overview of sandboxes. An information security technique.

Strong Password

A few examples of what makes a password strong or weak.

Personal Information

A definition of personal information with examples.


A definition of cybersecurity with examples.

Public Network

A definition of public network with examples.


A definition of sandbox with examples.
The most popular articles on Simplicable in the past day.

New Articles

Recent posts or updates on Simplicable.
Site Map