Palo Alto Networks
How to Prevent Security Breaches that Leverage Unknown Exploits
This paper provides a list of the Top 10 Zero-Day Exploits of 2015 and offers several possible conclusions based on the types of exploits and their associated cybercrime campaigns. It also provides additional details on three particularly effective zero-day exploits in brief case studies, each of which highlights the attack sequence, the exploit techniques used, and the ongoing risks attributed to each zero-day exploit. The document introduces a technical solution that prevents security breaches which leverage zero-day exploits, including the Top 10 Zero-Day Exploits of 2015.