Chapter 2

2014 Endpoint Exploitation Trends

Abstract

Before analyzing potential solutions, security teams tasked with protecting critical enterprise assets must track the shifting-attack landscape to understand key attack methods and targets. This chapter covers the growth in zero-day exploitation, and notable and emerging zero-day exploitation techniques.

Keywords

cyber-attack
Microsoft® Internet Explorer
Microsoft Office
Adobe Flash
Action Script Spray
zero day
spear phishing
Adobe Reader sandbox
address space layout randomization (ASLR)
data execution prevention (DEP)
Before analyzing potential solutions, security teams tasked with protecting critical enterprise assets must track the shifting attack landscape to understand key attack methods ...

Get How to Defeat Advanced Malware now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.