Countless software applications are hacked daily. Whether it’s a social engineering attack where the hacker covertly tricks an individual, a broad blast phishing attack, or a brute force attack where the hacker goes straight after vulnerabilities in an application. These attacks that target these types of vulnerabilities are more formally called “zero-day” attacks.