Key Takeaways
- A zero-day attack exploits a flaw the vendor doesn’t know about yet. No patch exists. No warning is possible.
- A one-day (or n-day) attack hits systems that have a patch available but haven’t applied it yet.
- Over 80% of Known Exploited Vulnerabilities (KEVs) tracked over the last four years were n-days, not zero-days.
- The average time to exploit a newly disclosed vulnerability dropped from 32 days to just 5 days. Some are now exploited before the patch is even public.
- Most businesses get hit by one-day attacks. Zero-days are harder to pull off but nearly impossible to block.
- Speed is now the only real defense. Patch cycles built around monthly schedules are a liability.
Introduction
In 2025, Google’s Threat Intelligence Group tracked 90 zero-day vulnerabilities exploited in the wild, with 48% of them targeting enterprise technology. That number gets a lot of attention. But the bigger, quieter threat is not the unknown flaw. It’s the known one sitting unpatched in your environment right now.
What Is a Zero-Day Attack?
A zero-day attack happens when someone finds and exploits a software flaw before the vendor knows it exists. There’s no patch, no alert, and no defense.
The name comes from the number of days the vendor has had to respond: zero.
The Zero-Day Lifecycle
Here’s how it plays out:
- A flaw exists inside software, hidden from everyone including the vendor
- An attacker or researcher finds it
- The attacker builds an exploit and starts using it
- The vendor finds out, usually after damage has already been done
- A patch gets released, sometimes weeks later
Real-World Examples
Three zero-days that changed how organizations think about patching:
Log4Shell (2021)
A flaw inside Apache Log4j, a logging tool embedded in millions of applications worldwide. Attackers could run code on any vulnerable server by sending a simple text string. At its peak, security firms tracked over 100 attacks per minute targeting this single vulnerability. Many organizations still don’t know everywhere Log4j runs in their environment.
MOVEit (2023)
The Cl0p ransomware group discovered a SQL injection flaw in MOVEit Transfer, a popular file transfer tool, and exploited it before Progress Software could issue a patch. The breach hit government agencies, universities, major corporations, and thousands of organizations worldwide. Some evidence suggests attackers were quietly testing the vulnerability as far back as 2021.
Chrome Zero-Days (2024)
Google patched multiple Chrome zero-days that year, with attackers using them to break out of the browser sandbox and run malicious code at elevated privileges. Seven Chrome vulnerabilities were exploited in the wild in 2024 alone.
Why Zero-Days Are So Hard to Stop
Traditional defenses run on signatures. Antivirus tools look for patterns they already recognize. Firewalls block known bad traffic. A zero-day bypasses all of it because nobody has written a rule for it yet.
You cannot patch what you don’t know is broken.
What Is a One-Day Attack? (And Where N-Day Fits In)
A one-day attack, also called an n-day attack, targets a vulnerability that already has a patch available but hasn’t been applied to your systems yet.
The “n” stands for the number of days since the patch dropped. That number can be 1, 30, or 400. The average time to remediate critical vulnerabilities exceeds 60 days across most organizations. Attackers know this and they count on it.
How Attackers Weaponize Public Proof-of-Concept Code
When a patch comes out, a CVE entry gets published. Often, security researchers release working Proof-of-Concept (PoC) exploit code alongside it to demonstrate the vulnerability is real.
That PoC becomes a ready-made attack kit. Attackers combine it with internet scanning tools like Shodan to find every unpatched system online. Within hours, mass exploitation begins.
A real example: an analysis of the BlackBasta ransomware group’s internal chat logs revealed that of 65 CVEs their team discussed, 54 were already listed as Known Exploited Vulnerabilities. They weren’t inventing new attack methods. They were using public knowledge against organizations that hadn’t patched yet.
Why this matters:
- Attacking n-days is cheap. No original research required.
- PoC code is often freely available within days of a patch release.
- Internet scanning tools make it easy to find vulnerable systems at scale.
- Even low-skill attackers can run successful n-day campaigns.
According to Flashpoint, n-day vulnerabilities now make up over 80% of all Known Exploited Vulnerabilities tracked over the past four years. This aligns with CISA’s KEV catalog data, which shows that the vast majority of actively exploited vulnerabilities are known flaws with available patches—not zero-days. The uncomfortable truth is that most breaches are not exotic. They are preventable.
Zero-Day vs One-Day Attack: The Real Differences
Here’s a direct comparison:
Which One Hits More Businesses?
One-day attacks, and it’s not close.
Most threat actors are not nation-state hackers with million-dollar research budgets. They’re ransomware groups and access brokers looking for the easiest path in. A known vulnerability with public exploit code and a slow-patching victim is exactly that.
Around 60% of breaches involve exploiting a known vulnerability where a patch was already available. That one number tells you where most organizations’ real risk actually sits.
Which One Is Harder to Defend Against?
Zero-days are harder to defend against because the flaw is unknown. You can’t patch it, write a signature for it, or even know it’s being used until something breaks.
But the gap between zero-day and one-day is shrinking fast.
The average time to exploit a newly disclosed vulnerability dropped from 32 days to just 5 days. Mandiant’s M-Trends 2026 report found the mean time to exploit is now effectively negative, meaning attackers are routinely exploiting flaws before the official patch is even public. A one-day attack can now feel almost identical to a zero-day if your team moves slowly.
The window your team has to respond is no longer measured in weeks. It’s measured in hours.
How to Defend Against Both
Speed is the one variable your team controls. Here’s what a modern defense actually looks like:
Patch Fast, Not on Schedule
Monthly patch cycles were designed for a world where attackers had 32 days. That world is gone. Anything on CISA’s Known Exploited Vulnerabilities list should be patched within days, not weeks.
What to do:
- Treat KEV list items as emergency patches, not routine tickets
- Use risk-based patching (who is exploiting this, and are you reachable?) instead of CVSS severity scores alone
- Set internal patch SLAs based on active exploitation data, not compliance deadlines
Get Full Visibility Into Your Assets
You cannot protect what you do not know you have. Shadow IT, forgotten cloud instances, and unmanaged endpoints are among the most common entry points for attackers. Continuous asset discovery means no blind spots for attackers to hide in. (Internal link)
Go Beyond Signatures
Traditional antivirus and intrusion detection systems look for known patterns. Against zero-days, they often miss everything. Behavioral detection looks for unusual activity rather than known bad code, which catches things signatures miss entirely.
Detection approaches that work:
- Behavioral analytics across endpoints and network traffic
- Threat hunting with human analysts, not just automated scans
- Deception technologies like honeypots to catch attacker recon early
Segment Your Network
When an attacker gets in, segmentation limits how far they can move. A compromise in one zone doesn’t have to become a full breach. Virtual patching at the network level can also buy time when a software fix isn’t immediately deployable.
Build a Response Plan Before You Need It
Organizations without a tested incident response plan take far longer to contain attacks. Every extra hour an attacker spends inside your network is time to escalate privileges, move laterally, or deploy ransomware. Review your IR plan quarterly, not annually.
Why Traditional Patch Cycles No Longer Work
The old model assumed defenders had weeks to respond. That assumption is now dangerous.
With time-to-exploit measured in hours and AI-powered tools helping attackers scan and launch attacks at scale, the compliance-driven “patch within 30 days” standard creates a predictable window that attackers actively count on. A fixed monthly schedule is effectively a promise to attackers that they have a reliable head start.
How Secure.com Helps
Knowing what to do is one thing. Actually doing it fast, with a lean team, against a daily flood of new vulnerabilities is a completely different problem.
Secure.com’s Digital Security Teammates are built for exactly this gap. Instead of waiting for your team to manually triage alerts, figure out which assets are affected, and kick off remediation, the SOC Teammate handles that work continuously.
Here’s what that means in practice:
- Continuous asset discovery: Assets across cloud, on-premises, and SaaS environments are automatically discovered and mapped in real-time, eliminating blind spots. No blind spots for attackers to find.
- Alert triage at speed: The SOC Teammate uses AI-driven correlation and threat intelligence enrichment to automatically triage alerts, suppress false positives, and surface high-fidelity incidents—cutting alert noise by up to 80%.
- Unified knowledge graph: A continuously-evolving graph connects all assets, identities, vulnerabilities, and threats with business context including ownership, criticality (CIA scoring), and relationships—providing the full picture security teams need to prioritize effectively. Nothing gets lost between tools.
- Remediation workflows: When something needs to be fixed, the path to fixing it is clear and actionable, not buried in a ticket queue.
The 5-day exploit window is real. Secure.com’s automation is built to help your team detect, prioritize, and remediate vulnerabilities inside that window—not react after attackers have already moved.
FAQs
Is a one-day attack the same as an n-day attack?
Can antivirus software stop a zero-day attack?
How long does it take attackers to exploit a newly disclosed CVE?
What’s more dangerous: a zero-day or a one-day attack?
Conclusion
The zero-day vs one-day debate often gets framed around sophistication. Nation-state actors use zero-days. Ransomware gangs use n-days. There’s truth in that, but it misses what actually matters for most security teams.
The common thread is speed. Attackers move faster than ever. The time between disclosure and active exploitation is now measured in hours. And the organizations that get hit are almost always the ones that were slow.
Patch fast. Know every asset you have. Detect behavior, not just known signatures. Build a response process that doesn’t require a 48-hour scramble to activate.
That’s the gap both zero-days and one-day attacks fit through. Close it.