Zero-Day Vulnerabilities: Understanding the Threat and How to Mitigate It