Zero-Day Exploits: How They Work and How to Defend Against Them