Zero-day vulnerabilities remain among the most dangerous threats to organizations and individuals, because by definition, there’s no patch, no warning, and often no time to respond before attackers strike. Over the last two months, multiple zero-day exploits have been discovered some already weaponized in real-world attacks.

What’s New — Zero-Days Exploited in the Wild

A major zeroday was discovered in Samsung’s image-processing library (libimagecodec.quram.so), exploited by a spyware campaign named LANDFALL. The campaign gained public attention in November 2025. Attackers delivered malicious DNG image files (disguised as normal images) via messaging apps — such as WhatsApp — which, when processed by a vulnerable device, triggered out-of-bounds memory writes, enabling remote code execution with zero-click (no user interaction needed).
The spyware reportedly allowed full compromise of target devices — giving attackers access to microphone, files, location, contacts, messages, and more. The flaw was added to the known=exploited vulnerabilities list, marking it as a serious and real threat. Malwarebytes+2F5 Community

In November 2025, Microsoft released its monthly Patch Tuesday fix, which addressed 63 vulnerabilities — including CVE-2025-62215, an actively exploited zero-day. This vulnerability affects the Windows kernel and allows local privilege escalation, enabling attackers to gain SYSTEM-level privileges via a race-condition in resource synchronization.

Once exploited (for example, by combining with a less-privileged initial access), this flaw could lead to full system compromise — making it particularly dangerous in enterprise and endpoint environments. redhotcyber.com

These incidents show — zero-day vulnerabilities are not theoretical risks anymore. They are active, evolving, and increasingly targeting both enterprise infrastructure (like WAFs) and mobile devices, often silently and at scale.

Why Zero-Day Protection Is Crucial

What You Should Do Right Now

  1. Patch immediately. If you use FortiWeb — upgrade to patched version (8.0.2 or newer). For Samsung devices or Windows machines, apply the latest security updates without delay.
  2. Restrict access to management interfaces. Never expose admin panels (e.g. FortiWeb management GUI) directly to the internet. If you must, restrict access via VPN, IP-whitelisting, or network segmentation.
  3. Harden endpoints and infrastructure. Use behavior-based detection tools (not just signature-based), implement least-privilege principles, and isolate critical systems.
  4. Monitor for suspicious activity. Audit logs for unexpected admin account creation, unexpected API or CLI commands, anomalous network traffic, or odd requests — especially after patching windows or devices.
  5. Educate users and admins. Especially for mobile devices — warn about opening unknown image files or attachments, even if they look safe (JPEG, PNG, etc.).

Zero-day threats are no longer rare, isolated events — they’ve become a part of everyday cyber risk. Whether you’re managing corporate infrastructure, servers, or mobile endpoints — you must assume that unknown vulnerabilities may already exist.

Preventive measures, prompt patching, vigilant monitoring, and strong security hygiene are no longer optional.