Cybersecurity for Zero-Day Exploits