<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="bbPress/1.2" -->
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Giveaway of the Day Forums &#187; Topic: Security: Rand Report Gives Stats On Zero Days</title>
		<link>https://www.giveawayoftheday.com/forums/topic/466770</link>
		<description>Giveaway of the Day Forums &#187; Topic: Security: Rand Report Gives Stats On Zero Days</description>
		<language>en-US</language>
		<pubDate>Fri, 10 Apr 2026 20:04:58 +0000</pubDate>
		<generator>http://bbpress.org/?v=1.2</generator>
		<atom:link href="https://www.giveawayoftheday.com/forums/rss/topic/466770" rel="self" type="application/rss+xml" />

		<item>
			<title>mikiem2 on "Security: Rand Report Gives Stats On Zero Days"</title>
			<link>https://www.giveawayoftheday.com/forums/topic/466770#post-578983</link>
			<pubDate>Sat, 11 Mar 2017 20:56:07 +0000</pubDate>
			<dc:creator>mikiem2</dc:creator>
			<guid isPermaLink="false">578983@https://www.giveawayoftheday.com/forums/</guid>
			<description><p>Over at petri[.]com Russell Smith posted an easy to follow explanation of how someone who&#39;s gained unauthorized access to one PC may use that to gain access to other systems on the network. While it&#39;s aimed at IT folks, the same sort of stuff works on your home network, and is one reason why it matters that IoT devices, a NAS etc. are all secure. <em>[Note: if you have a Western Digital NAS, a bunch of vulnerabilities have recently been discovered, &#38; not yet patched AFAIK.]</em></p>
<p><em>&#34;The Anatomy of a Privilege Escalation Attack&#34;</em></p>
<p>petri[.]com/anatomy-privilege-escalation-attack
</p></description>
		</item>
		<item>
			<title>mikiem2 on "Security: Rand Report Gives Stats On Zero Days"</title>
			<link>https://www.giveawayoftheday.com/forums/topic/466770#post-578970</link>
			<pubDate>Fri, 10 Mar 2017 22:00:22 +0000</pubDate>
			<dc:creator>mikiem2</dc:creator>
			<guid isPermaLink="false">578970@https://www.giveawayoftheday.com/forums/</guid>
			<description><p>There are basically 2 ways that someone(s) can get unauthorized access to a system or network -- get a would-be victim to do something that grants them access, lets them in, or by exploiting a software vulnerability or weakness.</p>
<p>The 1st method is the most common, scamming users to give up their passwords, to run malware attached to emails, to download &#38; run malicious software, to visit a malicious web site, or to visit a site that&#39;s been compromised or features malvertising &#38; so on. </p>
<p>The second relies on exploiting vulnerabilities to get around security features &#38;/or measures. Vulnerabilities are present when the system &#38;/or network is set up improperly, &#38;/or when security-related hot fixes or patches aren&#39;t applied. One security company reported that about 3/4 of the systems that were compromised had not had security patches applied. That makes sense -- most often when a security-related patch is released, it&#39;s accompanied by documentation of the vulnerability that&#39;s been fixed, often along with proof-of-concept code, and together they make a nice tutorial for cybercriminals. [It&#39;s also why software companies are so fond of automatic updates, vs. relying on users to check for &#38; apply them.]</p>
<p>But there&#39;s another category of vulnerabilities, those that hardly anyone knows about, and consequently there aren&#39;t any patches available. These are so-called Zero Days, and they&#39;re more often used by more elite cybercriminals &#38; spies, often working for a nation/state, often only for highly targeted systems &#38;/or networks. There are companies &#38; government agencies that work on developing these cyber weapons [the recent Wikileaks release says there are thousands of people working on Zero Days &#38; related for the CIA], and pragmatically, arms dealers too. </p>
<p>Their very nature means that getting your hands on a collection of Zero Days is both difficult &#38; expensive, though there have been a couple of publicized leaks from US intelligence agencies... One involved an archive of NSA tools that a group calling themselves Shadow Brokers tried to sell. The 2nd involves the recent Wikileaks release, where early reports say this very large trove of info [&#38; computer code] was circulating among a group of ex US gov workers, one of whom passed a portion of it to Wikileaks. </p>
<p>Whether either of those was involved or not, people at Rand managed to get their hands on a couple hundred Zero Days, which they analyzed. They also talked to several experts, Zero Day developers, brokers etc., and did a statistical analysis to provide some insight into the current Zero Day market [for lack of a better word]. The main highlights are interesting on their own, though if you want to take a deeper dive there&#39;s a PDF available for download that contains the book they published. </p>
<p>If nothing else, at a time where the public is debating how much access governments should have, when privacy advocates are pushing back hard, and when there&#39;s a discussion regarding how many of these Zero Days government agencies should report to better protect their citizens &#38; industries, reading just the highlights might provide some useful context.</p>
<p>rand[.]org/pubs/research_reports/RR1751.html</p>
<p>Zero Days, Thousands of Nights<br />
The Life and Times of Zero-Day Vulnerabilities and Their Exploits
</p></description>
		</item>

	</channel>
</rss>
