What We Do
How We Do
Get Started

Zero-Day Attacks:
A 2021 Review and What to Expect in 2022

Zero-day exploits have evolved a great deal over the past couple of years. An exploit is a piece of software, data, or a sequence of commands used to take advantage of a vulnerability. This combination of information and ability is used by cybercriminals and other threat actors to launch zero-day attacks with devastating impact to victims. While these cyberattacks cannot always be prevented, having a cyber risk mitigation strategy can help defend your organization from further business disruption.

In the past year, eSentire’s Threat Response Unit (TRU) detected and responded to a significant increase in zero-day exploit activity in client environments that included defending against critical exchange vulnerabilities ProxyLogon, ProxyShell, the REvil cyberattack against Kaseya and most recently, mass exploitation of Log4j vulnerabilities.

Watch this zero-day exploit webinar to learn about new zero-day cyberattack patterns, how to triage vulnerabilities, and the cybersecurity response capabilities needed to effectively tackle future zero-day attacks.

Learn more about:

  • Factors contributing to the rise of zero-day cyberattacks
  • Vulnerability triage considerations
  • Notable Vulnerability analysis of: SolarWinds, ProxyLogon, ProxyShell, and Kaseya VSA
  • Recommendations on how you can defend against zero-day exploits

Spence Hutchinson, Senior Threat Researcher
Keegan Keplinger, Research and Reporting Lead


Get The Webinar