International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 5 | Views: 78

Review Papers | Computer Science and Information Technology | United States of America | Volume 13 Issue 9, September 2024 | Popularity: 4.7 / 10


     

Ground Zero: An In-Depth Analysis of 2022's Zero-Day Vulnerabilities

Varadharaj Varadhan Krishnan


Abstract: A zero - day vulnerability is a vulnerability in software or hardware that is typically unknown to the vendor and there is no patch or fix is available. Zero - day vulnerabilities present a significant challenge to an organization?s cyber defense team. In 2022, the quantity of Zero - Day exploits significantly reduced compared to 2021. Zero days are still actively pursued by cybercriminal groups; they either actively find these vulnerabilities or buy them from the dark web. This article presents a thorough review of the Zero - Day vulnerabilities identified and exploited in 2022. This study analyzes trends, attack vectors, and the top targeted software platforms using public data sources such as Google's Threat Analysis Group (TAG), MITRE's CVE database, and Zero - Day. cz. A statistical analysis is performed to find trends and patterns. This study aims to offer insights from the zero - day vulnerabilities exploited in the wild in 2022 and serve as a valuable knowledge document for security teams responsible for security operations.


Keywords: Cybersecurity, Zero - day, Vulnerability Management, Cyber Defense, Security Incident Response


Edition: Volume 13 Issue 9, September 2024


Pages: 1203 - 1209


DOI: https://www.doi.org/10.21275/SR24920135032



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Varadharaj Varadhan Krishnan, "Ground Zero: An In-Depth Analysis of 2022's Zero-Day Vulnerabilities", International Journal of Science and Research (IJSR), Volume 13 Issue 9, September 2024, pp. 1203-1209, https://www.ijsr.net/getabstract.php?paperid=SR24920135032, DOI: https://www.doi.org/10.21275/SR24920135032



Similar Articles

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science and Information Technology, United States of America, Volume 12 Issue 10, October 2023

Pages: 868 - 870

Artificial Intelligence and Machine Learning in Infrastructure Security Whitepaper

Anirudh Mustyala

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science and Information Technology, United States of America, Volume 10 Issue 6, June 2021

Pages: 1859 - 1864

AI-based Systems Enhance Cybersecurity Defenses, Identify and Mitigate Cyber Threats in Real-Time

Rajesh Palthya

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Analysis Study Research Paper, Computer Science and Information Technology, Nigeria, Volume 13 Issue 3, March 2024

Pages: 1675 - 1679

Variations and Emerging Trends in Software Engineering

Elijah Ailen OMIJIE

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science and Information Technology, India, Volume 13 Issue 4, April 2024

Pages: 1826 - 1831

Automated Penetration Testing using Large Language Models

Dhananjai Sharma, Shria Verma

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science and Information Technology, India, Volume 13 Issue 5, May 2024

Pages: 518 - 527

Sine Cosine Algorithm with Optimal Convolutional Autoencoder for Intrusion Detection and Classification Model

K. Hemavathi, Dr. R. Latha

Share this Article
Top