Chapter 2

2014 Endpoint Exploitation Trends

Abstract

Before analyzing potential solutions, security teams tasked with protecting critical enterprise assets must track the shifting-attack landscape to understand key attack methods and targets. This chapter covers the growth in zero-day exploitation, and notable and emerging zero-day exploitation techniques.

Keywords

cyber-attack
Microsoft® Internet Explorer
Microsoft Office
Adobe Flash
Action Script Spray
zero day
spear phishing
Adobe Reader sandbox
address space layout randomization (ASLR)
data execution prevention (DEP)
Before analyzing potential solutions, security teams tasked with protecting critical enterprise assets must track the shifting attack landscape to understand key attack methods ...

Get How to Defeat Advanced Malware now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.