Cybercrime

Top 10 Zero-Day Exploits of 2015

Provided by Palo Alto Networks

Category Cybercrime

Type White Paper

Length 12

Publish Date March 16 2016

Date posted June 14 2016

Overview

This paper provides a list of the Top 10 Zero-Day Exploits of 2015 and offers several possible conclusions based on the types of exploits and their associated cybercrime campaigns. It also provides additional details on three particularly effective zero-day exploits in brief case studies, each of which highlights the attack sequence, the exploit techniques used, and the ongoing risks attributed to each zero-day exploit. The document introduces a technical solution that prevents security breaches which leverage zero-day exploits, including the Top 10 Zero-Day Exploits of 2015.

Blogs

mark-chillingworth

CIO Watch

Celebrate CIOs in a forklift year

Mark Chillingworth on IT leadership

phil-muncaster

China Rising

China’s Cybersecurity Law: Game over for foreign firms?

Phil Muncaster reports on China and beyond

jon-collins

Thinking Different

Today’s tech can’t beat my stupid email response

Jon Collins’ in-depth look at tech and society

Most Recent Comments

Resource Center

  • /view_company_report/775/aruba-networks
  • /view_company_report/419/splunk

Poll

Crowdfunding: Viable alternative to VC funding or glorified marketing?