{"id":53681,"date":"2023-09-14T13:13:11","date_gmt":"2023-09-14T13:13:11","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/35010\/With-Dozens-Of-Zero-Days-This-Month-Is-No-Software-Safe.html"},"modified":"2023-09-14T13:13:11","modified_gmt":"2023-09-14T13:13:11","slug":"with-dozens-of-zero-days-this-month-is-no-software-safe","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/with-dozens-of-zero-days-this-month-is-no-software-safe\/","title":{"rendered":"With Dozens Of Zero Days This Month, Is No Software Safe?"},"content":{"rendered":"<figure class=\"intro-image intro-left\"> <img decoding=\"async\" src=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2021\/02\/zeroday-800x534.jpg\" alt=\"The phrase Zero Day can be spotted on a monochrome computer screen clogged with ones and zeros.\"><figcaption class=\"caption\"><\/figcaption><\/figure>\n<aside id=\"social-left\" class=\"social-left\" aria-label=\"Read the comments or share this article\"> <a class=\"comment-count icon-comment-bubble-down\" href=\"https:\/\/arstechnica.com\/security\/2023\/09\/with-0-days-hitting-chrome-ios-and-dozens-more-this-month-is-no-software-safe\/?comments=1\"> <\/p>\n<h4 class=\"comment-count-before\">reader comments<\/h4>\n<p> <span class=\"comment-count-number\">82<\/span> <span class=\"visually-hidden\"> with <\/span> <\/a> <\/aside>\n<p> <!-- cache hit 13:single\/related:2e7aee095962da073612ae9198dd39f0 --><!-- empty --><\/p>\n<p>End users, admins, and researchers better brace yourselves: The number of apps being patched for zero-day vulnerabilities has skyrocketed this month and is likely to get worse in the following weeks.<\/p>\n<p>People have worked overtime in recent weeks to patch a raft of vulnerabilities actively exploited in the wild, with offerings from Apple, Microsoft, Google, Mozilla, Adobe, and Cisco all being affected since the beginning of the month. The number of zero-days tracked this month is considerably higher than the monthly average this year. September so far is at 10, compared with a total of 60 from January through August, according to security firm Mandiant. The company <a href=\"https:\/\/www.mandiant.com\/resources\/blog\/zero-days-exploited-2022\">tracked<\/a> 55 zero-days in 2022 and 81 in 2021.<\/p>\n<p>A sampling of the affected companies and products includes iOS and macOS, Windows, Chrome, Firefox, Acrobat and Reader, the Atlas VPN, and Cisco\u2019s Adaptive Security Appliance Software and its Firepower Threat Defense. The number of apps is likely to grow because a single vulnerability that allows hackers to execute malicious code when users open a booby-trapped image included in a message or web page is present in possibly hundreds of apps.<\/p>\n<p>This vulnerability, tracked as CVE-2023-4863, originates in a widely used code library known as <a href=\"https:\/\/chromium.googlesource.com\/webm\/libwebp\">libwebp<\/a>, which Google created more than a decade ago to render the then-new WebP graphics format. Libwebp, in turn, is incorporated into roughly <a href=\"https:\/\/archlinux.org\/packages\/extra\/x86_64\/libwebp\/\">70 downstream libraries<\/a> that are included in other libraries and popular apps. A single affected intermediate library known as Electron, for instance, runs in Microsoft Teams, Slack, Skype, Discord, and the desktop version of the Signal messenger, to name a few. Electron developers <a href=\"https:\/\/github.com\/electron\/electron\/pull\/39828\">fixed the bug<\/a> on Tuesday.<\/p>\n<aside class=\"ad_wrapper\" aria-label=\"In Content advertisement\"> <span class=\"ad_notice\">Advertisement <\/span> <\/aside>\n<p>Two different zero-days that have been keeping iOS and macOS users busy, meanwhile, were recently used in the wild to infect targets with an advanced piece of spyware known as Pegasus. Pegasus and the accompanying exploits used to install it are developed by the controversial seller NSO. The exploits delivered in attacks <a href=\"https:\/\/arstechnica.com\/gadgets\/2023\/09\/apple-patches-clickless-0-day-image-processing-vulnerability-in-ios-macos\/\">Apple warned of last week<\/a> were transmitted through iMessage calls and worked even when a user took no action.<\/p>\n<p>These vulnerabilities, tracked as CVE-2023-41064 and CVE-2023-41061, have a couple of things in common with the libwebp vulnerability. For one, they both provide remote code execution capabilities through malicious images. And for another, they were both discovered by a team comprising Apple\u2019s Security Engineering and Architecture team and Citizen Lab, a research group at the University of Toronto that tracks nation-state cyberattacks. It\u2019s currently unknown what relationship, if any, CVE-2023-41064 and CVE-2023-41061 have with CVE-2023-4863.<\/p>\n<p>Three different zero-days came to light on Tuesday, two from Microsoft and one from Adobe. One of them, CVE-2023-36761, allows hackers to obtain sensitive information such as password hashes by sending a target a malicious Word document. The other Microsoft vulnerability resides in the Streaming Service Proxy in supported versions of Windows. The Adobe vulnerability, tracked as CVE-2023-26369 and residing in Acrobat and Reader has a severity rating of 7.8 out of a possible 10. It allows attackers to remotely execute code.<\/p>\n<p>Two other zero-days reported in the past two weeks include:<\/p>\n<ul>\n<li>CVE-2023-20269 in Cisco\u2019s Adaptive Security Appliance Software and its Firepower Threat Defense. The company <a href=\"https:\/\/arstechnica.com\/security\/2023\/09\/ransomware-crooks-exploit-unpatched-0-day-in-cisco-security-appliances\/\">revealed on Monday<\/a> that it is being exploited in ransomware attacks.<\/li>\n<li>CVE-2023-35674, a vulnerability in Android that allows hackers to gain elevated privileges.<\/li>\n<\/ul>\n<aside class=\"ad_wrapper\" aria-label=\"In Content advertisement\"> <span class=\"ad_notice\">Advertisement <\/span> <\/aside>\n<p>On September 1, a researcher <a href=\"https:\/\/www.reddit.com\/r\/cybersecurity\/comments\/167f16e\/atlasvpn_linux_client_103_remote_disconnect\/\">took to Reddit<\/a> to post an exploit for an unpatched vulnerability in the Atlas VPN. It allows an attacker to learn the IP address of people using the VPN. Atlas representatives didn\u2019t immediately respond to an email asking about the status of the vulnerability.<\/p>\n<p>It\u2019s possible that yet another zero-day has come under exploitation in recent weeks. Researchers with Google\u2019s Project Zero <a href=\"https:\/\/arstechnica.com\/security\/2023\/09\/north-korea-backed-hackers-target-security-researchers-with-0-day\/\">said last week<\/a> that hackers backed by the North Korean government are exploiting it in attacks targeting security researchers. The researchers didn\u2019t name the affected software.<\/p>\n<p>With 70 zero-days uncovered so far this year, 2023 is on track to beat the previous record of 81 set in 2021. The most effective remedy is to install security patches as soon as they become available. Of course, that advice does nothing for the targets that are struck before the exploits become publicly known and patches have been issued. We have to repeat our precaution advice:<\/p>\n<ul>\n<li>Be suspicious of links, particularly those in email or messages, and don\u2019t ever follow prompts to install or update apps or browser extensions.<\/li>\n<li>Use a firewall such as the one in Windows or the <a href=\"https:\/\/objective-see.org\/products\/lulu.html\">LuLu firewall<\/a> for macOS. These programs won\u2019t prevent you from being infected by zero-days or other types of exploits. But by requiring newly installed apps to receive permission the first time they try to make an outgoing connection on the Internet, firewalls can contain the damage any installed malware can do.<\/li>\n<li>Run antivirus software.<\/li>\n<\/ul>\n<p>One other thing to remember regarding zero-days: Most of us aren\u2019t likely to be targeted by one. Exploits for this class of vulnerability often cost $1 million or more, and once they\u2019re unleashed on the Internet, it\u2019s generally only a matter of days until they become public knowledge and lose their value. That means zero-days are likely to be used only on a very small base of targets deemed to be high-value, such as government officials, dissidents, large companies, and holders of large amounts of cryptocurrency.<\/p>\n<p> READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/35010\/With-Dozens-Of-Zero-Days-This-Month-Is-No-Software-Safe.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":53682,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[10696],"class_list":["post-53681","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlinehackermicrosoftflawgoogleciscomozillaapplezero-day"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>With Dozens Of Zero Days This Month, Is No Software Safe? 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/with-dozens-of-zero-days-this-month-is-no-software-safe\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"With Dozens Of Zero Days This Month, Is No Software Safe? 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/with-dozens-of-zero-days-this-month-is-no-software-safe\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-09-14T13:13:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2021\/02\/zeroday-800x534.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/with-dozens-of-zero-days-this-month-is-no-software-safe\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/with-dozens-of-zero-days-this-month-is-no-software-safe\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"With Dozens Of Zero Days This Month, Is No Software Safe?\",\"datePublished\":\"2023-09-14T13:13:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/with-dozens-of-zero-days-this-month-is-no-software-safe\\\/\"},\"wordCount\":908,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/with-dozens-of-zero-days-this-month-is-no-software-safe\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/with-dozens-of-zero-days-this-month-is-no-software-safe.jpg\",\"keywords\":[\"headline,hacker,microsoft,flaw,google,cisco,mozilla,apple,zero day\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/with-dozens-of-zero-days-this-month-is-no-software-safe\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/with-dozens-of-zero-days-this-month-is-no-software-safe\\\/\",\"name\":\"With Dozens Of Zero Days This Month, Is No Software Safe? 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/with-dozens-of-zero-days-this-month-is-no-software-safe\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/with-dozens-of-zero-days-this-month-is-no-software-safe\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/with-dozens-of-zero-days-this-month-is-no-software-safe.jpg\",\"datePublished\":\"2023-09-14T13:13:11+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/with-dozens-of-zero-days-this-month-is-no-software-safe\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/with-dozens-of-zero-days-this-month-is-no-software-safe\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/with-dozens-of-zero-days-this-month-is-no-software-safe\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/with-dozens-of-zero-days-this-month-is-no-software-safe.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/with-dozens-of-zero-days-this-month-is-no-software-safe.jpg\",\"width\":800,\"height\":534},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/with-dozens-of-zero-days-this-month-is-no-software-safe\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,microsoft,flaw,google,cisco,mozilla,apple,zero day\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinehackermicrosoftflawgoogleciscomozillaapplezero-day\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"With Dozens Of Zero Days This Month, Is No Software Safe?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"With Dozens Of Zero Days This Month, Is No Software Safe? 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/with-dozens-of-zero-days-this-month-is-no-software-safe\/","og_locale":"en_US","og_type":"article","og_title":"With Dozens Of Zero Days This Month, Is No Software Safe? 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/with-dozens-of-zero-days-this-month-is-no-software-safe\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-09-14T13:13:11+00:00","og_image":[{"url":"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2021\/02\/zeroday-800x534.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/with-dozens-of-zero-days-this-month-is-no-software-safe\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/with-dozens-of-zero-days-this-month-is-no-software-safe\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"With Dozens Of Zero Days This Month, Is No Software Safe?","datePublished":"2023-09-14T13:13:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/with-dozens-of-zero-days-this-month-is-no-software-safe\/"},"wordCount":908,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/with-dozens-of-zero-days-this-month-is-no-software-safe\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/09\/with-dozens-of-zero-days-this-month-is-no-software-safe.jpg","keywords":["headline,hacker,microsoft,flaw,google,cisco,mozilla,apple,zero day"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/with-dozens-of-zero-days-this-month-is-no-software-safe\/","url":"https:\/\/www.threatshub.org\/blog\/with-dozens-of-zero-days-this-month-is-no-software-safe\/","name":"With Dozens Of Zero Days This Month, Is No Software Safe? 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/with-dozens-of-zero-days-this-month-is-no-software-safe\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/with-dozens-of-zero-days-this-month-is-no-software-safe\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/09\/with-dozens-of-zero-days-this-month-is-no-software-safe.jpg","datePublished":"2023-09-14T13:13:11+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/with-dozens-of-zero-days-this-month-is-no-software-safe\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/with-dozens-of-zero-days-this-month-is-no-software-safe\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/with-dozens-of-zero-days-this-month-is-no-software-safe\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/09\/with-dozens-of-zero-days-this-month-is-no-software-safe.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/09\/with-dozens-of-zero-days-this-month-is-no-software-safe.jpg","width":800,"height":534},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/with-dozens-of-zero-days-this-month-is-no-software-safe\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,microsoft,flaw,google,cisco,mozilla,apple,zero day","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackermicrosoftflawgoogleciscomozillaapplezero-day\/"},{"@type":"ListItem","position":3,"name":"With Dozens Of Zero Days This Month, Is No Software Safe?"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/53681","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=53681"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/53681\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/53682"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=53681"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=53681"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=53681"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}