A zero-day attack is an attack that is still unknown to the vendor, software developer, and/or system administrators. It is an attack that is newly discovered by malicious users.
A zero-day (also known as zero-hour or 0-day or day zero) vulnerability is a computer-software vulnerability that is unknown to those who would be interested in mitigating the vulnerability (including the vendor of the target software). Until the vulnerability is mitigated, hackers can exploit it to adversely affect computer programs, data, additional computers or a network. An exploit directed at a zero-day vulnerability is called a zero-day exploit, or zero-day attack.
In the jargon of computer …