IsThisAScam
AcasăBlogPrețuriDespreHistoryAPIExtension
Upgrade
RO
Sign in
Sign in
IsThisAScam

Independent scam & phishing analysis. Free for individuals. APIs for developers.

Operated by Zeplik, Inc.
Produs
  • Home
  • Blog
  • Pricing
  • Despre
  • History
  • Chrome Extension
Resources
  • Developers
  • Documentația API
  • Phishing brief
  • Romance scams
  • Tech support
  • Crypto scams
  • Apple scams
  • PayPal scams
Legal
  • Politica de Confidențialitate
  • Termeni și Condiții
  • product@zeplik.com

© 2026 Zeplik, Inc. Toate drepturile rezervate.

Built for the calm, the cautious, and the careful.

Home/Glossary/Zero-Day Exploit
Glossary · Technical Concept

What Is a Zero-Day Exploit?

An attack that exploits a previously unknown software vulnerability for which no patch or fix exists yet — called "zero-day" because the vendor has had zero days to address the flaw since its discovery.

Quick Definition

An attack that exploits a previously unknown software vulnerability for which no patch or fix exists yet — called "zero-day" because the vendor has had zero days to address the flaw since its discovery.

Think you've been targeted?

Paste the suspicious content here for an instant analysis.

No signup · 6 detection layers · Results in seconds · Cmd+Enter

01Zero-Day Exploit explained.

Zero-day exploits represent the most dangerous class of cyber threats because there is no defense against them at the time of attack. The vulnerability is unknown to the software vendor and the security community, meaning no patch exists and traditional security tools cannot detect the attack.

The term "zero-day" refers to the number of days the vendor has known about the vulnerability. Once discovered and disclosed, the vendor has "zero days" to fix it before it can be exploited — though in practice, the exploit may have been used secretly for weeks, months, or even years before discovery.

Zero-day exploits are extremely valuable. On the legitimate market, companies like Zerodium pay up to $2.5 million for iOS zero-days. Nation-states are believed to stockpile zero-days for use in intelligence operations and cyber warfare.

02How it works.

01A researcher or attacker discovers a vulnerability in software that the vendor doesn't know about
02If a malicious actor, they develop an exploit that takes advantage of the vulnerability
03The exploit is used to attack targets — often through phishing, compromised websites, or direct attacks
04Because no patch exists, antivirus and security tools may not detect the attack
05The vulnerability remains exploitable until the vendor discovers it and releases a patch

03Real-world example.

The Pegasus spyware used multiple iOS zero-day exploits to silently infect iPhones with no user interaction required — not even clicking a link. It exploited zero-days in iMessage's handling of media files, allowing full device compromise through a single invisible message.

04How to protect yourself.

01Keep all software updated immediately when patches are released — many "zero-days" become known vulnerabilities once disclosed
02Use software with automatic updates enabled
03Minimize your attack surface by uninstalling unused software and browser plugins
04Use application-level sandboxing (built into modern browsers and operating systems)
05Practice defense in depth — assume any single layer can be bypassed
Related Terms
MalwareSpywareWatering Hole Attack
Explore Scam Types
phishingromancecryptoinvestmenttech supportdelivery
Suspect Something?

Run a scan on the message you received.

Run a scan →