Zero-Day attacks are not new. For some time now, hackers have realized that software programs are vulnerable and that unintentional flaws in software can be exploited to bury malware that can be used to access otherwise secure data. Malicious code can sit unnoticed within an environment for days, months, or years collecting sensitive data without being detected. Zero-day vulnerabilities are one of the most common and most difficult attacks to protect against.