A cyber attack that exploits a vulnerability in software or hardware that is unknown to the vendor or security community.