2.6.9 Zero-day Attacks
Attackers look for vulnerabilities in new software or new versions of software. When they find those vulnerabilities, they determine how best to attack, share that information with other attackers, and launch an attack on users who have installed the software. This is called a zero-day or zero-hour attack. The term describes the amount of awareness time that the developer had to figure out the fix and distribute it to users.