Connect with us

Hi, what are you looking for?


Endpoint Security

Kaspersky Adds Zero-Day, Exploit, and Targeted Attack (ZETA) Technology to 2014 Security Suite

SAN FRANCISCO – Sometimes, a targeted attack against a business starts at home. In the corporate world, security comes from layered defenses that sometime prove to be too much for an attacker. However, when it comes to systems at home, such protections are rare, if they exist at all.

SAN FRANCISCO – Sometimes, a targeted attack against a business starts at home. In the corporate world, security comes from layered defenses that sometime prove to be too much for an attacker. However, when it comes to systems at home, such protections are rare, if they exist at all.

It’s an unfortunate reality. People don’t update their systems, such as applying patches or maintaining their security software. This leaves them wide open for attack, and sometimes this is just the key a criminal needs to access the corporate network. When this happens, the attacker has used the classic method of attacking the path of least resistance.

“I think that people are the easiest. The social engineering aspect, I think is the path of least resistance. And it’s the most difficult to protect against as well. It comes down to training and awareness about vulnerabilities,” commented Tiffany Rad, a member of Kaspersky Lab’s Global Research and Analysis Team.

Kaspersky Lab Office in MoscowCommonsense isn’t something that can be taught. A person either has it or they don’t. However, avoiding the social aspect of an attack can and should include awareness training. Teach employees to think twice about something that just doesn’t seem right or feels different and to ask questions, Rad added.

When it comes to protecting assets at home, and the information contained on them, it’s hard to enforce corporate policy outside of the office, especially when the employee is using a system that is theirs entirely and not something purchased for them by the company.

Yet, Rad mentioned that she thinks that some companies, especially those that have business with the government, do stress the need to keep systems updated, and they do make the employee (especially those in the C-Level) aware of the fact they may be targeted due to the nature of their work or the level of access they possess.

Still, all the awareness in the world won’t protect a system if it is vulnerable to a known exploit, compromised due to user error, or it’s passively attacked via a malicious website.

During a launch event for their upcoming 2014 product line, Kaspersky Lab introduced the Zero-Day, Exploit, and Targeted Attack (ZETA) technology, as one of the latest developments to protect the systems of those individuals that represent the path of least resistance to an attacker.

ZETA is designed to counteract targeted attacks that rely on exploits targeting software vulnerabilities, by scanning the data stream for code fragments with the characteristics of exploits. If such things are detected, then the attack is halted.

Advertisement. Scroll to continue reading.

By working with data streams instead of individual files, ZETA is able to provide a deeper analysis of incoming data, and identify non-standard elements and the connections between them – which may be a strong indicator of a potential threat.

Updates to ZETA are managed by a dedicated group of researchers who study techniques used by exploits to spread and compromise systems, in addition to the constant stream of data from Kaspersky’s cloud network. It was initially part of Kaspersky’s Linux Mail protection for businesses, but it was soon ported to the consumer line after proving its effectiveness.

In the end though, while technologies like ZETA can be a huge help in defending against targeted attacks, it’s not a silver bullet. The best defense will come from a solid offense in the form of layered protection and healthy sense of awareness.

Disclosure: Accommodations for SecurityWeek to attend the Kaspersky Lab product launch event were provided by Kaspersky Lab under the condition that no coverage was guaranteed, nor would positive coverage be guaranteed.

Written By

Click to comment


Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Gain valuable insights from industry professionals who will help guide you through the intricacies of industrial cybersecurity.


Join us for an in depth exploration of the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects.


Expert Insights

Related Content


The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.


A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Endpoint Security

Today, on January 10, 2023, Windows 7 Extended Security Updates (ESU) and Windows 8.1 have reached their end of support dates.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Malware & Threats

Unpatched and unprotected VMware ESXi servers worldwide have been targeted in a ransomware attack exploiting a vulnerability patched in 2021.


No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.


The recent ransomware attack targeting Rackspace was conducted by a cybercrime group named Play using a new exploitation method, the cloud company revealed this...