A zero-day exploit exploits a previously unknown weakness in software or hardware. Attackers use these exploits before the developer has had a chance to release a patch, making them particularly risky. Zero-day exploits can be get more info used for malicious purposes and often lead to system compromise. Software engineers constantly work to identi