E-Guide: Why attackers exploit multiple zero-day attacks and how to respond

E-Guide: Why attackers exploit multiple zero-day attacks and how to respond

Cover

The Stuxnet worm has received significant media coverage for the large number of different types of systems it has infected. Stuxnet is similar to the Operation Aurora attacks from December 2009 and the Zeus botnet in that it demonstrates cutting-edge techniques in the way malware is created. However, Stuxnet is more sophisticated, primarily because it exploits several zero-day vulnerabilities at once. While it's always hard to predict the future of malware, it's safe to say this won't be the last attack that utilizes multiple zero-day exploits simultaneously. In this tip, we'll discuss this tactic in the context of Stuxnet, and explain how enterprises can fend off similar exploits in the future.

Vendor:
ESET
Posted:
16 Mar 2011
Published
16 Mar 2011
Format:
PDF
Length:
8 Page(s)
Type:
eGuide
Language:
English
Already a Bitpipe member? Login here

Download this eGuide!

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy