{"id":48,"date":"2022-05-30T12:38:18","date_gmt":"2022-05-30T12:38:18","guid":{"rendered":"https:\/\/www.hjtechs.net\/?p=48"},"modified":"2023-02-07T20:06:27","modified_gmt":"2023-02-07T20:06:27","slug":"zero-day-attack","status":"publish","type":"post","link":"https:\/\/www.hjtechs.net\/?p=48","title":{"rendered":"Zero-day Attack"},"content":{"rendered":"\n<p>&#8220;Zero-day&#8221; is a broad term that describes recently discovered security vulnerabilities that hackers can use to attack systems. The term &#8220;zero-day&#8221; refers to the fact that the vendor or developer has only just learned of the flaw \u2013 which means they have \u201czero days\u201d to fix it. A zero-day attack takes place when hackers exploit the flaw before developers have a chance to address it.<\/p>\n\n\n\n<p>Zero-day is sometimes written as 0-day. The words vulnerability, exploit, and attack are typically used alongside zero-day, and it\u2019s helpful to understand the difference:<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;Zero-day&#8221; is a broad term that describes recently discovered security vulnerabilities that hackers can use to attack systems. The term &#8220;zero-day&#8221; refers to the fact that the vendor or developer has only just learned of the flaw \u2013 which means they have \u201czero days\u201d to fix it. A zero-day attack takes place when hackers exploit [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-48","post","type-post","status-publish","format-standard","hentry","category-info"],"_links":{"self":[{"href":"https:\/\/www.hjtechs.net\/index.php?rest_route=\/wp\/v2\/posts\/48","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hjtechs.net\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hjtechs.net\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hjtechs.net\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hjtechs.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=48"}],"version-history":[{"count":0,"href":"https:\/\/www.hjtechs.net\/index.php?rest_route=\/wp\/v2\/posts\/48\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.hjtechs.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=48"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hjtechs.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=48"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hjtechs.net\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=48"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}