By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: The Zero-Day Scramble is Avoidable: A Guide to Attack Surface Reduction
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > The Zero-Day Scramble is Avoidable: A Guide to Attack Surface Reduction
Computing

The Zero-Day Scramble is Avoidable: A Guide to Attack Surface Reduction

News Room
Last updated: 2026/03/10 at 8:01 AM
News Room Published 10 March 2026
Share
The Zero-Day Scramble is Avoidable: A Guide to Attack Surface Reduction
SHARE

You can’t control when the next critical vulnerability drops. You can control how much of your environment is exposed when it does. The problem is that most teams have more internet-facing exposure than they realise. Intruder’s Head of Security digs into why this happens and how teams can manage it deliberately.

Time-to-exploit is shrinking

The larger and less controlled your attack surface is, the more opportunities exist for exploitation. And the window to act on them is shrinking fast. For the most serious vulnerabilities, disclosure to exploitation can be as short as 24 to 48 hours. Zero Day Clock projects that time-to-exploit will be just minutes by 2028.

That’s not a lot of time when you consider what has to happen before a patch is deployed: running scans, waiting for results, raising tickets, agreeing priorities, implementing, and verifying the fix. If disclosure lands out of hours, it takes even longer.

In many cases, vulnerable systems don’t need to be internet-facing in the first place. With visibility of the attack surface, teams can reduce unnecessary exposure upfront and avoid the scramble altogether when a new vulnerability drops.

When a zero-day drops on a Saturday

ToolShell was an unauthenticated remote code execution vulnerability in Microsoft SharePoint. If an attacker could reach it, they could run code on your server – and because SharePoint is Active Directory-connected, they’d be starting in a highly sensitive part of your environment.

This was a zero-day, meaning attackers were exploiting it before a patch was available. Microsoft disclosed on a Saturday and confirmed that Chinese state-sponsored groups had been exploiting it for up to two weeks before that. By the time most teams knew about it, opportunistic attackers were scanning for exposed instances and exploiting at scale.

Intruder’s research found thousands of publicly accessible SharePoint instances at the time of disclosure – despite the fact that SharePoint doesn’t need to be internet-facing. Every one of those exposures was unnecessary – and every unpatched server was an open door.

Why exposures get missed

So why do exposures so often get missed by security teams?

In a typical external scan, informational findings sit beneath hundreds of criticals, highs, mediums, and lows. But that information can include detections that represent real exposure risk, such as:

  • An exposed SharePoint server
  • A database exposed to the internet, such as MySQL or Postgres
  • Other protocols, which should usually be reserved for the internal network, such as RDP and SNMP

Here’s a real example of what that looks like:

In vulnerability scanning terms, classifying these as informationals sometimes makes sense. If the scanner sits on the same private subnet as the targets, an exposed service might genuinely be low risk. But when that same service is exposed to the internet, it carries real risk even without a known vulnerability attached to it. Yet. 

The danger is that traditional scan reports treat both cases the same way, so the real risks slip through the gaps.

What proactive attack surface reduction actually involves

There are three key elements to making attack surface reduction work in practice.

1. Asset discovery: define your attack surface

Before you can reduce your attack surface, you need a clear picture of what you own and what’s externally reachable. That starts with identifying shadow IT – systems your organization owns or operates but isn’t currently scanning or monitoring.

Closing that gap is important, and there are three key elements we recommend having in place: 

  1. Integrating with your cloud and DNS providers so that when new infrastructure is created, it’s automatically picked up and scanned. This is one area where defenders have a genuine advantage: you can integrate directly with your own environments, attackers can’t.
  2. Using subdomain enumeration to surface externally reachable hosts that aren’t in your inventory. This matters especially after acquisitions, where you may be inheriting infrastructure you don’t yet have visibility of. 
  3. Identifying infrastructure hosted with smaller, unknown cloud providers. You may have a security policy that mandates development teams only use your primary cloud provider, but you need to check that practice is being followed.

Watch a deep dive into these techniques:

. Treat exposure as risk

The next step is treating attack surface exposure as a risk category in its own right.

That requires a detection capability that identifies which informational findings represent an exposure and assigns appropriate severity. An exposed SharePoint instance, for example, might reasonably be treated as a medium-risk issue. 

It also means carving out space for this work in how you prioritize. If strategic efforts like attack surface reduction are always competing against urgent patching, they will always lose. That might mean setting aside time each quarter to review and reduce exposure, or assigning clear ownership so someone is accountable for it – not just when a crisis hits, but routinely.

3. Continuous monitoring

Attack surface reduction isn’t a one-time exercise. Exposure changes constantly – a firewall rule gets edited, a new service gets deployed, a subdomain gets forgotten – and your team needs to detect those changes quickly.

Vulnerability scans take time to complete, and running full scans daily isn’t usually possible. Daily port scanning is a better fit. It’s lightweight, fast, and means you can detect newly exposed services as they appear. If someone edits a firewall rule and accidentally exposes Remote Desktop, you find out the day it happens – not at the next scheduled scan, which could be up to a month later.

Fewer exposed services, fewer surprises

When unnecessary services aren’t exposed in the first place, they’re far less likely to be caught up in the mass exploitation that follows a critical disclosure. That means fewer surprises, less urgent scrambling, and more time to respond deliberately when new vulnerabilities emerge.

Intruder automates this process – from discovering shadow IT and monitoring for new exposures, to alerting your team the moment something changes – so your security team can stay ahead of exposure rather than reacting to it. 

If you want to see what’s exposed in your environment, book a demo of Intruder.

Found this article interesting? This article is a contributed piece from one of our valued partners. Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Expanded open banking could add £43bn to UK economy – UKTN Expanded open banking could add £43bn to UK economy – UKTN
Next Article ‘Flying Cars’ Will Take Off in American Skies This Summer ‘Flying Cars’ Will Take Off in American Skies This Summer
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

OpenSSL 4.0 Alpha 1 Released With Encrypted Client Hello “ECH” & Other Features
OpenSSL 4.0 Alpha 1 Released With Encrypted Client Hello “ECH” & Other Features
Computing
Apple’s iMac could get fun Neo-like colors this year
Apple’s iMac could get fun Neo-like colors this year
News
Pop Mart leads China’s new consumer stock rally as female-driven spending surges · TechNode
Pop Mart leads China’s new consumer stock rally as female-driven spending surges · TechNode
Computing
Group Text Split into Separate Conversations? Here’s the Fix!
Group Text Split into Separate Conversations? Here’s the Fix!
News

You Might also Like

OpenSSL 4.0 Alpha 1 Released With Encrypted Client Hello “ECH” & Other Features
Computing

OpenSSL 4.0 Alpha 1 Released With Encrypted Client Hello “ECH” & Other Features

1 Min Read
Pop Mart leads China’s new consumer stock rally as female-driven spending surges · TechNode
Computing

Pop Mart leads China’s new consumer stock rally as female-driven spending surges · TechNode

3 Min Read
Inside DR Congo’s emerging startup ecosystem
Computing

Inside DR Congo’s emerging startup ecosystem

15 Min Read
The TechBeat: Inside Tencent Games’ Real-Time Event-Driven Analytics System (3/10/2026) | HackerNoon
Computing

The TechBeat: Inside Tencent Games’ Real-Time Event-Driven Analytics System (3/10/2026) | HackerNoon

7 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?