{"id":21388,"date":"2023-12-06T02:40:54","date_gmt":"2023-12-06T02:40:54","guid":{"rendered":"https:\/\/masterskills.org\/blog\/zero-day-attack-la-gi-cach-phong-zero-day-attack-hieu-qua.html"},"modified":"2023-12-22T04:54:54","modified_gmt":"2023-12-21T21:54:54","slug":"zero-day-attack-la-gi-cach-phong-zero-day-attack-hieu-qua","status":"publish","type":"post","link":"https:\/\/masterskills.org\/blog\/zero-day-attack-la-gi-cach-phong-zero-day-attack-hieu-qua.html","title":{"rendered":"Zero-day attack l\u00e0 g\u00ec? C\u00e1ch ph\u00f2ng zero-day attack hi\u1ec7u qu\u1ea3"},"content":{"rendered":"<div class=\"entry-content\">\n<figure class=\"wp-block-image size-large\"><\/figure>\n<p>Zero-day attack l\u00e0 g\u00ec kh\u00f4ng c\u00f2n qu\u00e1 xa l\u1ea1 v\u1edbi ng\u01b0\u1eddi l\u00e0m vi\u1ec7c trong ng\u00e0nh c\u00f4ng ngh\u1ec7 th\u00f4ng tin nh\u01b0ng v\u1edbi \u201cd\u00e2n ngo\u1ea1i \u0111\u1ea1o\u201d \u0111\u00e2y l\u00e0 m\u1ed9t kh\u00e1i ni\u1ec7m c\u00f2n qu\u00e1 xa l\u1ea1. H\u00f4m nay h\u00e3y c\u00f9ng t\u00ecm hi\u1ec3u v\u1ec1 thu\u1eadt ng\u1eef n\u00e0y nh\u00e9.<\/p>\n<h2><span id=\"Zero-day_va_Zero-day_attack_la_gi\"><strong>Zero-day v\u00e0 Zero-day attack l\u00e0 g\u00ec?<\/strong><\/span><\/h2>\n<p>Th\u1eddi bu\u1ed5i hi\u1ec7n \u0111\u1ea1i \u0111\u1ed3ng ngh\u0129a v\u1edbi vi\u1ec7c c\u00f4ng ngh\u1ec7 ng\u00e0y c\u00e0ng ph\u00e1t tri\u1ec3n v\u01b0\u1ee3t tr\u1ed9i k\u00e8m theo \u0111\u00f3 l\u00e0 nh\u1eefng nguy c\u01a1 v\u1ec1 l\u1ed7 h\u1ed5ng b\u1ea3o m\u1eadt. M\u1ed9t trong nh\u1eefng l\u1ed7 h\u1ed5ng ti\u00eau bi\u1ec3u nh\u1ea5t v\u00e0 kh\u00f3 gi\u1ea3i quy\u1ebft nh\u1ea5t l\u00e0 l\u1ed7 h\u1ed5ng zero day.<\/p>\n<p>Zero-day l\u00e0 thu\u1eadt ng\u1eef ch\u1ec9 nh\u1eefng l\u1ed7 h\u1ed5ng b\u1ea3o m\u1eadt m\u00e0 ch\u01b0a c\u00f3 b\u1ea3n v\u00e1 ho\u1eb7c ng\u01b0\u1eddi ph\u00e1t tri\u1ec3n ph\u1ea7n m\u1ec1m ch\u01b0a bi\u1ebft \u0111\u1ebfn v\u00e0 ch\u01b0a kh\u1eafc ph\u1ee5c. L\u1ed7 h\u1ed5ng zero-day t\u1ed3n t\u1ea1i \u1edf nhi\u1ec1u m\u00f4i tr\u01b0\u1eddng kh\u00e1c nhau nh\u01b0 ph\u1ea7n m\u1ec1m \u2013 ph\u1ea7n c\u1ee9ng m\u00e1y t\u00ednh, \u1ee9ng d\u1ee5ng mobile, h\u1ec7 th\u1ed1ng internet doanh nghi\u1ec7p, website, cloud\u2026<\/p>\n<p>Th\u00f4ng th\u01b0\u1eddng, khi ph\u00e1t hi\u1ec7n ra l\u1ed7 h\u1ed5ng ph\u1ea7n m\u1ec1m, c\u00e1c nh\u00e0 l\u1eadp tr\u00ecnh ho\u1eb7c cung c\u1ea5p s\u1ea3n ph\u1ea9m s\u1ebd \u0111\u01b0a ra m\u1ed9t b\u1ea3n \u201cv\u00e1\u201d b\u1ea3o m\u1eadt trong phi\u00ean b\u1ea3n ph\u00e1t h\u00e0nh m\u1edbi. Tuy nhi\u00ean, h\u1ea7u h\u1ebft ng\u01b0\u1eddi d\u00f9ng r\u1ea5t \u00edt khi t\u1ef1 c\u1eadp nh\u1eadt ph\u1ea7n m\u1ec1m th\u01b0\u1eddng xuy\u00ean, do \u0111\u00f3 c\u00e1c l\u1ed7 h\u1ed5ng zero-day c\u00f3 nguy c\u01a1 g\u00e2y h\u1ea1i r\u1ea5t l\u1edbn.<\/p>\n<p>Khi l\u1ed7 h\u1ed5ng zero day xu\u1ea5t hi\u1ec7n, c\u00e1c tin t\u1eb7c c\u00f3 th\u1ec3 t\u1eadn d\u1ee5ng \u0111\u1ec3 x\u00e2m nh\u1eadp t\u1ee9c th\u00ec v\u00e0o h\u1ec7 th\u1ed1ng b\u1ea3o m\u1eadt v\u00e0 ng\u00e0y m\u00e0 nh\u00e0 ph\u00e1t tri\u1ec3n s\u1ea3n ph\u1ea9m bi\u1ebft t\u1edbi s\u1ef1 t\u1ed3n t\u1ea1i c\u1ee7a l\u1ed7 h\u1ed5ng \u0111\u00f3 g\u1ecdi l\u00e0 \u201cng\u00e0y 0\u201d. \u0110\u00f3 c\u0169ng ch\u00ednh l\u00e0 l\u00fd do ra \u0111\u1eddi c\u1ee7a th\u1eadt ng\u1eef \u201czero-day\u201d (0-day) v\u00ec s\u1edf d\u0129 c\u00e1c nh\u00e0 ph\u00e1t h\u00e0nh ph\u1ea7n m\u1ec1m c\u00f3 0 ng\u00e0y \u0111\u1ec3 s\u1eeda ch\u1eefa ch\u00fang.<\/p>\n<blockquote>\n<p><em><strong>\u201cKhi m\u1ed9t hacker khai th\u00e1c \u0111\u01b0\u1ee3c l\u1ed7 h\u1ed5ng ph\u1ea7n m\u1ec1m tr\u01b0\u1edbc khi c\u00e1c nh\u00e0 l\u1eadp tr\u00ecnh ph\u00e1t hi\u1ec7n ra v\u00e0 s\u1eeda ch\u1eefa th\u00ec vi\u1ec7c khai th\u00e1c \u0111\u00f3 g\u1ecdi l\u00e0 zero-day attack ho\u1eb7c zero-day exploit.\u201d<\/strong><\/em><\/p>\n<\/blockquote>\n<p>\u0110\u1eb7c \u0111i\u1ec3m c\u1ee7a m\u1ed9t cu\u1ed9c t\u1ea5n c\u00f4ng l\u1ed7 h\u1ed5ng ph\u1ea7n m\u1ec1m l\u00e0 ch\u00fang \u0111\u01b0\u1ee3c tri\u1ec3n khai m\u1ed9t c\u00e1ch b\u00ed m\u1eadt v\u00e0 l\u00e9n l\u00fat. Zero-day attack c\u00f3 th\u1ec3 xu\u1ea5t hi\u1ec7n \u1edf h\u1ea7u h\u1ebft m\u1ecdi h\u00ecnh th\u1ee9c. V\u00ed d\u1ee5 ch\u00fang c\u00f3 th\u1ec3 bi\u1ec3u hi\u1ec7n \u1edf d\u1ea1ng chuy\u1ec3n h\u01b0\u1edbng URL, thi\u1ebfu m\u00e3 h\u00f3a d\u1eef li\u1ec7u, s\u1ef1 c\u1ed1 k\u1ebft n\u1ed1i internet, SQL injection, l\u1ed7i hay s\u1ef1 c\u1ed1 m\u1eadt kh\u1ea9u\u2026<\/p>\n<p>Nh\u1eefng cu\u1ed9c t\u1ea5n c\u00f4ng nh\u01b0 v\u1eady c\u00f3 kh\u1ea3 n\u0103ng th\u00e0nh c\u00f4ng r\u1ea5t cao v\u00ec kh\u00f4ng c\u00f3 b\u1ea3n v\u00e1 n\u00e0o \u0111\u01b0\u1ee3c \u0111\u01b0a ra \u0111\u1ec3 b\u1ea3o v\u1ec7 khi m\u00e0 ch\u00ednh c\u00e1c nh\u00e0 l\u1eadp tr\u00ecnh ph\u1ea7n m\u1ec1m c\u0169ng kh\u00f4ng bi\u1ebft \u0111\u1ebfn s\u1ef1 t\u1ed3n t\u1ea1i c\u1ee7a ch\u00fang. \u0110i\u1ec1u n\u00e0y khi\u1ebfn cho c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng zero-day tr\u1edf th\u00e0nh m\u1ed9t m\u1ed1i \u0111e d\u1ecda b\u1ea3o m\u1eadt c\u1ef1c k\u1ef3 nghi\u00eam tr\u1ecdng.<\/p>\n<p>V\u00ed d\u1ee5, ch\u1ec9 c\u1ea7n ph\u1ea7n m\u1ec1m c\u00f3 m\u1ed9t l\u1ed7i nh\u1ecf \u0111\u01b0\u1ee3c ph\u00e1t hi\u1ec7n, b\u1ea1n c\u0169ng c\u00f3 nguy c\u01a1 b\u1ecb \u0111\u00e1nh c\u1eafp th\u00f4ng tin r\u1ea5t cao. H\u1ec7 th\u1ed1ng ho\u1eb7c \u1ee9ng d\u1ee5ng c\u00e0ng ph\u1ed5 bi\u1ebfn th\u00ec kh\u1ea3 n\u0103ng \u1ea3nh h\u01b0\u1edfng c\u1ee7a zero-day attack \u0111\u1ebfn ng\u01b0\u1eddi d\u00f9ng c\u00e0ng l\u1edbn v\u00e0 thi\u1ec7t h\u1ea1i c\u00e0ng kh\u00f3 c\u00f3 th\u1ec3 \u0111o \u0111\u1ebfm \u0111\u01b0\u1ee3c. L\u1ed7 h\u1ed5ng zero-day th\u1ef1c s\u1ef1 l\u00e0 n\u1ed7i \u00e1c m\u1ed9ng c\u1ee7a c\u1ea3 ng\u01b0\u1eddi d\u00f9ng l\u1eabn nh\u00e0 ph\u00e1t tri\u1ec3n s\u1ea3n ph\u1ea9m. \u0110\u00e2y l\u00e0 l\u00fd do khi\u1ebfn zero-day attack tr\u1edf th\u00e0nh m\u1ed9t mi\u1ebfng m\u1ed3i ngon trong m\u1eaft c\u00e1c tin t\u1eb7c v\u00e0 \u0111\u01b0\u1ee3c mua b\u00e1n v\u1edbi gi\u00e1 tr\u1ecb kh\u1ee7ng khi\u1ebfp.<\/p>\n<p><strong>Th\u1ecb tr\u01b0\u1eddng ho\u1ea1t \u0111\u1ed9ng c\u1ee7a zero-day attack<\/strong><\/p>\n<p>Tr\u00ean th\u1ef1c t\u1ebf, kh\u00f4ng ph\u1ea3i ch\u1ec9 c\u00f3 c\u00e1c tin t\u1eb7c m\u1edbi t\u1eadn d\u1ee5ng th\u1ef1c hi\u1ec7n zero-day attack. C\u00e1c l\u1ed7 h\u1ed5ng zero-day c\u0169ng l\u00e0 m\u1ed9t th\u1ee9 h\u00e0ng h\u00f3a r\u1ea5t c\u00f3 gi\u00e1 tr\u1ecb \u0111\u1ed1i v\u1edbi c\u00e1c c\u01a1 quan t\u00ecnh b\u00e1o qu\u1ed1c gia hay th\u1eadm ch\u00ed v\u1edbi ch\u00ednh c\u00e1c nh\u00e0 ph\u00e1t tri\u1ec3n ph\u1ea7n m\u1ec1m. Nh\u00ecn chung, c\u00e1c l\u1ed7 h\u1ed5ng b\u1ea3o m\u1eadt zero-day \u0111\u01b0\u1ee3c giao d\u1ecbch qua 3 th\u1ecb tr\u01b0\u1eddng ch\u00ednh:<\/p>\n<p>Black market (ch\u1ee3 \u0111en): l\u00e0 th\u1ecb tr\u01b0\u1eddng m\u00e0 c\u00e1c hacker m\u0169 \u0111en giao d\u1ecbch c\u00e1c l\u1ed7 h\u1ed5ng zero-day nh\u1eb1m m\u1ee5c \u0111\u00edch x\u00e2m nh\u1eadp v\u00e0o h\u1ec7 th\u1ed1ng b\u1ea3o m\u1eadt v\u00e0 l\u1ea5y c\u1eafp th\u00f4ng tin d\u1eef li\u1ec7u ng\u01b0\u1eddi d\u00f9ng.<\/p>\n<p>White market: l\u00e0 th\u1ecb tr\u01b0\u1eddng t\u1ed3n t\u1ea1i d\u01b0\u1edbi d\u1ea1ng c\u00e1c ch\u01b0\u01a1ng tr\u00ecnh s\u0103n ti\u1ec1n th\u01b0\u1edfng g\u1ecdi l\u00e0 bug bounty. Th\u01b0\u1eddng th\u00ec c\u00e1c t\u1eadp \u0111o\u00e0n l\u1edbn nh\u01b0 Facebook, Microsoft, Google\u2026 \u0111\u1ec1u t\u1ed5 ch\u1ee9c c\u00e1c ch\u01b0\u01a1ng tr\u00ecnh nh\u1eb1m mua l\u1ea1i c\u00e1c l\u1ed7 h\u1ed5ng t\u1eeb nh\u1eefng ng\u01b0\u1eddi tham gia v\u00e0 ph\u00e1t hi\u1ec7n ch\u00fang. S\u1ed1 ti\u1ec1n th\u01b0\u1edfng cho ng\u01b0\u1eddi t\u00ecm ra c\u00e1c l\u1ed7 h\u1ed5ng n\u00e0y c\u00f3 th\u1ec3 l\u00ean \u0111\u1ebfn h\u00e0ng ch\u1ee5c ngh\u00ecn \u0111\u00f4.<\/p>\n<p>Gray market: l\u00e0 n\u01a1i giao d\u1ecbch gi\u1eefa c\u00e1c chuy\u00ean gia b\u1ea3o m\u1eadt v\u1edbi qu\u00e2n \u0111\u1ed9i ho\u1eb7c c\u00e1c c\u01a1 quan t\u00ecnh b\u00e1o qu\u1ed1c gia. C\u00e1c chuy\u00ean gia s\u1ebd nghi\u00ean c\u1ee9u v\u00e0 b\u00e1n c\u00e1c m\u00e3 khai th\u00e1c zero-day cho c\u00e1c t\u1ed5 ch\u1ee9c qu\u1ed1c gia \u0111\u1ec3 ph\u1ee5c v\u1ee5 c\u00e1c ho\u1ea1t \u0111\u1ed9ng an ninh qu\u1ed1c gia.<\/p>\n<h2><span id=\"Cac_bien_phap_chong_lai_lo_hong_zero-day_attack_la_gi\"><strong>C\u00e1c bi\u1ec7n ph\u00e1p ch\u1ed1ng l\u1ea1i l\u1ed7 h\u1ed5ng zero-day attack l\u00e0 g\u00ec?<\/strong><\/span><\/h2>\n<p>L\u1ed7 h\u1ed5ng ph\u1ea7n m\u1ec1m d\u00f9 l\u00e0 zero-day hay \u0111\u00e3 \u0111\u01b0\u1ee3c c\u00f4ng b\u1ed1, \u0111\u1ec1u d\u1eabn \u0111\u1ebfn kh\u1ea3 n\u0103ng b\u1ecb x\u00e2m nh\u1eadp v\u00e0 g\u00e2y ra nh\u1eefng r\u1ee7i ro, thi\u1ec7t h\u1ea1i nghi\u00eam tr\u1ecdng cho ng\u01b0\u1eddi d\u00f9ng v\u00e0 c\u00e1c qu\u1ea3n tr\u1ecb vi\u00ean ph\u1ea7n m\u1ec1m. Do \u0111\u00f3, vi\u1ec7c ch\u1ee7 \u0111\u1ed9ng th\u1ef1c hi\u1ec7n c\u00e1c bi\u1ec7n ph\u00e1p ph\u00f2ng ch\u1ed1ng l\u1ed7 h\u1ed5ng b\u1ea3o m\u1eadt lu\u00f4n l\u00e0 \u0111i\u1ec1u c\u1ea7n thi\u1ebft. V\u1eady c\u00e1c bi\u1ec7n ph\u00e1p ph\u00f2ng ch\u1ed1ng zero-day attack l\u00e0 g\u00ec? D\u01b0\u1edbi \u0111\u00e2y l\u00e0 nh\u1eefng bi\u1ec7n ph\u00e1p ch\u1ed1ng l\u1ea1i zero-day attack hi\u1ec7u qu\u1ea3 m\u00e0 b\u1ea1n c\u00f3 th\u1ec3 tham kh\u1ea3o.<\/p>\n<p><strong>S\u1eed d\u1ee5ng ph\u1ea7n m\u1ec1m c\u00f3 b\u1ea3n quy\u1ec1n<\/strong><\/p>\n<p>M\u1ed9t ph\u1ea7n m\u1ec1m kh\u00f4ng c\u00f3 b\u1ea3n quy\u1ec1n (crack) r\u00f5 r\u00e0ng lu\u00f4n ti\u1ec1m \u1ea9n c\u00e1c nguy c\u01a1 v\u1ec1 b\u1ea3o m\u1eadt v\u00e0 l\u00e0 n\u01a1i \u0111\u1ec3 c\u00e1c hacker t\u1eadn d\u1ee5ng l\u1ed7 h\u1ed5ng \u0111\u1ec3 t\u1ea5n c\u00f4ng ng\u01b0\u1eddi d\u00f9ng.<\/p>\n<p><strong>C\u1eadp nh\u1eadt phi\u00ean b\u1ea3n m\u1edbi c\u1ee7a \u1ee9ng d\u1ee5ng v\u00e0 h\u1ec7 \u0111i\u1ec1u h\u00e0nh<\/strong><\/p>\n<p>C\u00e1c phi\u00ean b\u1ea3n c\u1eadp nh\u1eadt c\u1ee7a ph\u1ea7n m\u1ec1m v\u00e0 h\u1ec7 \u0111i\u1ec1u h\u00e0nh th\u01b0\u1eddng bao g\u1ed3m c\u00e1c b\u1ea3n c\u1eadp nh\u1eadt kh\u1eafc ph\u1ee5c l\u1ed7i c\u1ee7a b\u1ea3n tr\u01b0\u1edbc \u0111\u00f3 v\u00e0 c\u00f3 c\u00e1c b\u1ea3n v\u00e1 l\u1ed7 h\u1ed5ng b\u1ea3o m\u1eadt t\u1eeb nh\u00e0 cung c\u1ea5p. Vi\u1ec7c c\u1eadp nh\u1eadt phi\u00ean b\u1ea3n m\u1edbi gi\u00fap gi\u1ea3m thi\u1ec3u t\u1ed1i \u0111a nguy c\u01a1 b\u1ecb l\u00e2y nhi\u1ec5m ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i ho\u1eb7c nguy c\u01a1 b\u1ecb tin t\u1eb7c khai th\u00e1c l\u1ed7 h\u1ed5ng.<\/p>\n<p><strong>S\u1eed d\u1ee5ng ph\u1ea7n m\u1ec1m antivirus c\u00f3 c\u00f4ng ngh\u1ec7 b\u1ea3o v\u1ec7 d\u1ef1a tr\u00ean h\u00e0nh vi<\/strong><\/p>\n<p>C\u00e1c ph\u1ea7n m\u1ec1m n\u00e0y c\u00f3 kh\u1ea3 n\u0103ng theo d\u00f5i h\u00e0nh vi \u0111ang ng\u1edd c\u1ee7a virus nh\u01b0 t\u1ef1 \u0111\u1ed9ng t\u1ea3i xu\u1ed1ng c\u00e1c th\u00f4ng tin \u0111\u0103ng nh\u1eadp, ghi l\u1ea1i thao t\u00e1c b\u00e0n ph\u00edm\u2026 v\u00e0 b\u1ea3o v\u1ec7 m\u00e1y t\u00ednh b\u1eb1ng c\u00e1ch lo\u1ea1i b\u1ecf c\u00e1c nh\u00e2n t\u1ed1 nguy hi\u1ec3m n\u00e0y.<\/p>\n<p><strong>S\u1eed d\u1ee5ng gi\u1ea3i ph\u00e1p\/ph\u1ea7n m\u1ec1m r\u00e0 qu\u00e9t l\u1ed7 h\u1ed5ng b\u1ea3o m\u1eadt<\/strong><\/p>\n<p>C\u00e1c ph\u1ea7n m\u1ec1m b\u1ea3o m\u1eadt chuy\u00ean d\u1ee5ng l\u00e0 l\u1edbp ph\u00f2ng ng\u1ef1 an to\u00e0n m\u00e0 b\u1ea1n n\u00ean c\u00f3. C\u00e1c ph\u1ea7n m\u1ec1m n\u00e0y s\u1ebd c\u1ea3nh b\u00e1o v\u00e0 ph\u00e1t hi\u1ec7n k\u1ecbp th\u1eddi c\u00e1c l\u1ed7 h\u1ed5ng b\u1ea3o m\u1eadt nguy hi\u1ec3m v\u00e0 \u0111\u01b0a ra nh\u1eefng \u0111\u1ec1 xu\u1ea5t ph\u00f9 h\u1ee3p \u0111\u1ec3 gi\u1ea3i quy\u1ebft ch\u00fang.<\/p>\n<p><strong>Backup d\u1eef li\u1ec7u<\/strong><\/p>\n<p>H\u00e3y sao l\u01b0u c\u00e1c d\u1eef li\u1ec7u quan tr\u1ecdng l\u00ean \u0111\u00e1m m\u00e2y, vi\u1ec7c n\u00e0y gi\u00fap ng\u01b0\u1eddi d\u00f9ng tr\u00e1nh \u0111\u01b0\u1ee3c t\u00ecnh tr\u1ea1ng b\u1ecb x\u00f3a s\u1ea1ch th\u00f4ng tin khi s\u1ef1 c\u1ed1 l\u1ed7 h\u1ed5ng x\u1ea3y ra.<\/p>\n<p><strong>Tri\u1ec3n khai h\u1ec7 th\u1ed1ng IDS v\u00e0 IPS<\/strong><\/p>\n<p>H\u1ec7 th\u1ed1ng IDS (ph\u00e1t hi\u1ec7n x\u00e2m nh\u1eadp) v\u00e0 IPS (ng\u0103n ch\u1eb7n x\u00e2m nh\u1eadp) c\u00f3 t\u00e1c d\u1ee5ng b\u1ea3o v\u1ec7 h\u1ec7 th\u1ed1ng c\u1ee7a b\u1ea1n kh\u1ecfi c\u00e1c r\u1ee7i ro x\u00e2m nh\u1eadp \u0111\u00e3 bi\u1ebft v\u00e0 ch\u01b0a bi\u1ebft. \u0110i\u1ec1u n\u00e0y s\u1ebd gi\u00fap b\u1ea1n ch\u1ee7 \u0111\u1ed9ng h\u01a1n trong vi\u1ec7c x\u1eed l\u00fd c\u00e1c l\u1ed7 h\u1ed5ng n\u1ebfu c\u00f3.<\/p>\n<p>Tr\u00ean \u0111\u00e2y l\u00e0 nh\u1eefng th\u00f4ng tin c\u01a1 b\u1ea3n v\u1ec1 l\u1ed7 h\u1ed5ng zero-day attack l\u00e0 g\u00ec, hi v\u1ecdng b\u00e0i vi\u1ebft c\u00f3 th\u1ec3 gi\u00fap b\u1ea1n hi\u1ec3u h\u01a1n v\u1ec1 lo\u1ea1i l\u1ed7 h\u1ed5ng b\u1ea3o m\u1eadt n\u00e0y. Zero-day attack c\u00f3 th\u1ec3 di\u1ec5n ra b\u1ea5t c\u1ee9 l\u00fac n\u00e0o khi\u1ebfn c\u00e1c nh\u00e0 ph\u00e1t tri\u1ec3n ph\u1ea7n m\u1ec1m l\u1eabn ng\u01b0\u1eddi d\u00f9ng \u0111au \u0111\u1ea7u, h\u00e3y c\u1ea9n th\u1eadn nh\u00e9.<\/p>\n<p style=\"text-align: right;\"><strong>H\u00e0 Ph\u01b0\u01a1ng<\/strong><\/p>\n<p>\u00a0<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Zero-day attack l\u00e0 g\u00ec kh\u00f4ng c\u00f2n qu\u00e1 xa l\u1ea1 v\u1edbi ng\u01b0\u1eddi l\u00e0m vi\u1ec7c trong ng\u00e0nh c\u00f4ng ngh\u1ec7 th\u00f4ng tin nh\u01b0ng v\u1edbi \u201cd\u00e2n ngo\u1ea1i \u0111\u1ea1o\u201d \u0111\u00e2y l\u00e0 m\u1ed9t kh\u00e1i ni\u1ec7m c\u00f2n qu\u00e1 xa l\u1ea1. H\u00f4m nay h\u00e3y c\u00f9ng t\u00ecm hi\u1ec3u v\u1ec1 thu\u1eadt ng\u1eef n\u00e0y nh\u00e9.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[429],"tags":[],"_links":{"self":[{"href":"https:\/\/masterskills.org\/blog\/wp-json\/wp\/v2\/posts\/21388"}],"collection":[{"href":"https:\/\/masterskills.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/masterskills.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/masterskills.org\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/masterskills.org\/blog\/wp-json\/wp\/v2\/comments?post=21388"}],"version-history":[{"count":0,"href":"https:\/\/masterskills.org\/blog\/wp-json\/wp\/v2\/posts\/21388\/revisions"}],"wp:attachment":[{"href":"https:\/\/masterskills.org\/blog\/wp-json\/wp\/v2\/media?parent=21388"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/masterskills.org\/blog\/wp-json\/wp\/v2\/categories?post=21388"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/masterskills.org\/blog\/wp-json\/wp\/v2\/tags?post=21388"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}