What Does "Zero Day" Mean?

Zero-Day” is an intriguing concept in the domain of cybersecurity. Imagine diligently following security best practices such as patching exploits and updating the systems regularly. Plus, you’re following strict risk management and governance frameworks within the organization to vet new software applications for security risk before adding them to your library.

But what happens when the security flaws are novel — and a patch does not exist? 🆘

That’s zero day, and that’s what I’ll explain here.

Understanding zero day

Cybercriminals actively search for such opportunities in the wild before typical users figure out the problem and take security measures. Most technology vendors are careful about disclosing vulnerabilities publicly if a patch is not immediately available.

Zero-day, representing the number of days for which the vulnerability has been made public, requires the defenders to take immediate action against potential attempts to exploit the vulnerability. As such, zero-day exploitation remains a coveted practice among hacking elites and sophisticated state-sponsored cybercriminals.

While most cybercriminals would exploit known vulnerabilities (that users have chosen not to fix), cybercriminals who discover zero-day attacks have also created an underground brokerage brokerage market for zero-day exploits. These exploits are sold for anywhere between $5,000 to $250,000 apiece.

(Track these security trends & gear-up at these events.)

Zero-day vulnerability vs exploit vs attack

The term zero-day is used interchangeably for vulnerabilities, exploits and attacks, but there are a few subtle differences:

Hackers, hobbyists, cybercriminals and state-sponsored attackers frequently use zero-day exploits because it gives them an immediate and significant advantage: The flaw is already known and left without an immediate fix, so the vulnerability allows them to bypass the security defense measures that are in place.

Infamous zero-day exploits

Let’s take a look at some of the famous zero-day exploits.

Stuxnet Worm self-destructs nuclear centrifuges

Arguably one of the most famous zero-day attacks took place in 2010. A zero-day vulnerability in the SCADA system running gas centrifuges at Iran’s nuclear plants was exploited. The attack infected Siemens PLC automation system that configured and controlled the electromagnetic processes. Once infected, the gas centrifuges were made to spin at a high frequency beyond the operating range, while the systems returned normal operating values to the users monitoring motor performance. This ultimately caused the motors to self-destruct, as the present safeguards and alerts were not triggered.

It is this apparent self-destruction of the motors that clued the world into the power of such vulnerabilities. The digital is no longer limited to the digital world: it can have real-world (and disastrous) effects.

(Read about this & other historic events in our must-read security books.)

3 billion Yahoo! accounts sold for $300,000

In 2013, around 3 billion Yahoo! accounts were compromised due to a zero-day attack. Cybercriminals were able to extract personally identifiable sensitive user information including name, age, phone number and passwords. Although this data was encrypted, news suggests that the weak encryption schemes were cracked and hackers were able to fully access the compromised data.

The full extent of the damages was not discovered, but some cybercriminals reportedly paid around $300,000 for the compromised databases.

92% of LinkedIn accounts data compromised

By April 2021, over 700 million user account records on the LinkedIn platform were compromised by a zero-day attack. The exploit scrapped data from an archive that contained public identifiers including name, email address, phone numbers and professional titles. This information was available for sale on the Dark Web and was likely used for mass spamming activities, including social engineering phishing attacks that trick unsuspecting users into:

While LinkedIn issued a fix to resolve the vulnerability, implications of the attack continued to impact the end-users over the long term.

Sony Pictures Entertainment state-sponsored attack

As one of the most popular politically motivated and state-sponsored zero-day attacks, the hacking group Guardians of Peace demanded Sony Pictures Entertainment to remove political messaging in their movie, The Interview.

The zero-day vulnerability remained undetected for months and hackers were able to access sensitive corporate data including employee emails, personal information, unreleased scripts and film project details. The exploit used the Shamoon virus, which has been behind major politically motivated attacks on government entities around the world.

(Read about ransomware families, often the culprits behind major attacks.)

Defending against Day 0 attacks

So how do you protect yourself against 0Day attacks when the vendor responsible for securing the systems has not yet discovered the vulnerability or created a working patch solution? The following best practices can help:

Related Articles

How to Use LLMs for Log File Analysis: Examples, Workflows, and Best Practices
Learn
7 Minute Read

How to Use LLMs for Log File Analysis: Examples, Workflows, and Best Practices

Learn how to use LLMs for log file analysis, from parsing unstructured logs to detecting anomalies, summarizing incidents, and accelerating root cause analysis.
Beyond Deepfakes: Why Digital Provenance is Critical Now
Learn
5 Minute Read

Beyond Deepfakes: Why Digital Provenance is Critical Now

Combat AI misinformation with digital provenance. Learn how this essential concept tracks digital asset lifecycles, ensuring content authenticity.
The Best IT/Tech Conferences & Events of 2026
Learn
5 Minute Read

The Best IT/Tech Conferences & Events of 2026

Discover the top IT and tech conferences of 2026! Network, learn about the latest trends, and connect with industry leaders at must-attend events worldwide.
The Best Artificial Intelligence Conferences & Events of 2026
Learn
4 Minute Read

The Best Artificial Intelligence Conferences & Events of 2026

Discover the top AI and machine learning conferences of 2026, featuring global events, expert speakers, and networking opportunities to advance your AI knowledge and career.
The Best Blockchain & Crypto Conferences in 2026
Learn
5 Minute Read

The Best Blockchain & Crypto Conferences in 2026

Explore the top blockchain and crypto conferences of 2026 for insights, networking, and the latest trends in Web3, DeFi, NFTs, and digital assets worldwide.
Log Analytics: How To Turn Log Data into Actionable Insights
Learn
11 Minute Read

Log Analytics: How To Turn Log Data into Actionable Insights

Breaking news: Log data can provide a ton of value, if you know how to do it right. Read on to get everything you need to know to maximize value from logs.
The Best Security Conferences & Events 2026
Learn
6 Minute Read

The Best Security Conferences & Events 2026

Discover the top security conferences and events for 2026 to network, learn the latest trends, and stay ahead in cybersecurity — virtual and in-person options included.
Top Ransomware Attack Types in 2026 and How to Defend
Learn
9 Minute Read

Top Ransomware Attack Types in 2026 and How to Defend

Learn about ransomware and its various attack types. Take a look at ransomware examples and statistics and learn how you can stop attacks.
How to Build an AI First Organization: Strategy, Culture, and Governance
Learn
6 Minute Read

How to Build an AI First Organization: Strategy, Culture, and Governance

Adopting an AI First approach transforms organizations by embedding intelligence into strategy, operations, and culture for lasting innovation and agility.