A zero-day exploit targets a software vulnerability unknown to the vendor. Since no patch exists, attackers can exploit it immediately.
Defense includes monitoring suspicious activity, applying virtual patches, and using intrusion detection systems.