Understanding Zero-Day Vulnerabilities and How to Protect Your Systems