Zero day exploits are particularly dangerous because they're launched on the same day a vulnerability in your system is discovered—before antivirus signatures are available to detect them. As the vulnerability is known only to the attacker, no patch exists to mitigate it. Zero-day exploits can be used to infect computers, steal data, install ransomware and other malware, and spread unchecked until a patch is created and installed. Office applications, web browsers, operating systems, even IoT devices can be affected by zero- day attacks