News/Trends

Security in the Zero-Window Era

Yogesh Badwe, Chief Security Officer

For years, cybersecurity programs have been built around a basic assumption: defenders have some amount of time.

A researcher reports a vulnerability. A vendor investigates. Engineering builds a patch. Security teams test it. IT schedules deployment. Attackers eventually reverse-engineer the fix and try to exploit whoever is still exposed.

That sequence still exists. The time inside it is shrinking fast.

Just this week, Google said it disrupted an attempt by a criminal group to use AI to exploit a previously unknown vulnerability in a popular open-source, web-based system administration tool. The flaw could allow attackers to bypass two-factor authentication. Google’s Threat Intelligence Group said it had high confidence the attackers used an AI model to help discover and weaponize the vulnerability, and that they were preparing for mass exploitation.

This is already happening.

Security leaders should treat that as a current operating reality. AI-assisted exploitation is no longer limited to research previews, advanced labs, or frontier models behind restricted access. More capable models will increase the scale and precision of this activity, but attackers don’t need the most advanced system in the world to gain an advantage. Models available today can help analyze code, interpret patches, write exploit logic, and remove manual work from the attacker’s process.

We’re also only seeing the public portion of this activity. Many attempts won’t become a headline, a vendor blog, or a detailed threat report. Some will be stopped. Some will fail. Some will succeed before anyone outside the impacted organization knows what happened.

That puts security leaders in what many are now calling the zero-window era: a cybersecurity environment where AI compresses the time between vulnerability discovery, weaponization, exploitation, and impact.

The patch window is shrinking

A public commit, a short advisory, a patch note, or a technical write-up can become useful attack material faster than many organizations can move through review, testing, approval, and deployment.

Even when a vendor moves quickly, customers still have work to do. They need to identify exposure, coordinate ownership, assess business impact, test the patch, schedule deployment, and confirm remediation. That’s a lot of process to complete while attackers are using AI to accelerate their side of the work.

This pressure was already building before the latest wave of AI capability. Vulnerability exploitation has become one of the most important drivers of breach activity, especially across internet-facing systems, third-party and open source software, identity infrastructure, and security tools. AI accelerates a problem that security teams were already struggling to contain.

The concern for security leaders is practical: can the organization understand exposure and act before a vulnerability becomes part of an active campaign?

The answer depends on whether your security strategy is built to race the attacker or render the exploit irrelevant by re-focusing on recovery and resilience.

How to Accelerate Security Operations with AI

Strong security fundamentals remain essential: phishing-resistant MFA, least privilege, hardened systems, secure configuration, and disciplined vulnerability management. Those practices become more valuable as AI increases the speed and scale of attacker activity. These need to be augmented and made more efficient with AI-powered capabilities, including AI-enabled vulnerability and alert triage to materially reduce response times.

The workflows also need to move faster.

A customer-managed system that requires manual patching can become a race between the organization trying to remediate and the attacker trying to exploit. In many cases, the attacker has fewer constraints. They don’t need a change window. They don’t need regression testing. They don’t need to coordinate across business owners, production teams, and maintenance schedules.

Security teams should be using AI to accelerate vulnerability discovery, triage, remediation, secure code review, internal testing, and incident response. AI can help teams understand where risk exists, how severe it is, what systems are affected, and what action needs to happen first.

Human judgment still matters, especially as the volume and speed of findings increase. The opportunity is to give security teams better leverage. AI can reduce repetitive analysis, correlation, and context-gathering so people can focus on decisions that carry real business risk.

The same thinking applies to secure development. AI-assisted review can help identify risky patterns earlier, assess the impact of code changes, and find similar weaknesses across a broader codebase. Internal penetration testing and security impact assessments should become faster, more continuous, and more closely tied to how software is actually built and deployed.

Recovery Needs a Larger Role

Patching faster is necessary. It’s also incomplete.

Even mature organizations will face situations where exposure exists before remediation is complete. Some vulnerabilities will be exploited before patches are available. Some systems will be missed. Some attacks will move through credentials, misconfigurations, or trusted access rather than a traditional software flaw.

Recovery infrastructure has to be isolated, resilient, and protected from the same risks facing production systems. Backup and recovery environments can’t become another exposed layer that customers have to constantly manage, harden, and patch on their own.

Operational simplicity matters because complexity creates delay. The fewer systems an organization has to deploy and maintain itself, the fewer places there are for patching backlogs, configuration drift, and administrative exposure to accumulate. That’s especially important for systems tied to critical data, business continuity, and incident recovery.

5 Critical Security Questions for the Zero-Window Era

  • How quickly can we determine whether we’re exposed to a newly disclosed vulnerability?
  • Which critical systems still depend on manual triage, manual patching, or delayed maintenance windows?
  • Are we using AI to help security teams move faster?
  • Can we recover cleanly if exploitation moves faster than our patch process?
  • Do our vendors reduce operational burden, or do they add more systems we have to secure ourselves?

These questions belong in security reviews, executive risk conversations, resilience planning, and vendor evaluations.

How Druva is Applying This

At Druva, we’re approaching this shift with the same discipline we encourage customers to adopt: strengthen the fundamentals, reduce unnecessary exposure, and use AI to help defenders move faster.

Our security foundation includes strong MFA, hardened systems, least privilege, secure development practices, and dependable vulnerability management. We’re also investing in AI-assisted defensive capabilities across our own security workflows, including vulnerability triage and remediation, prompt-driven Security Impact Assessments, and AI-assisted internal penetration testing.

We’ve built a knowledge framework that helps our teams connect product architecture, source code, deployment context, threat models, access controls, and security standards. That foundation helps improve developer efficiency, streamline security workflows, expand review coverage, and support faster remediation.

Druva’s fully-managed SaaS architecture also plays an important role for customers. Reducing customer-managed infrastructure reduces the number of systems customers have to deploy, harden, monitor, and patch themselves. As attackers move faster from vulnerability discovery to attempted exploitation, reducing that burden becomes part of resilience.

The zero-window era calls for a more disciplined security model: strong fundamentals, AI-assisted defense, less infrastructure for customers to manage, and recovery systems built to preserve trust under pressure.

That is where security leadership needs to focus now.

Druva Blog: Cloud Technology & Data Protection Articles