Here is a Select Sub-set of Zero-day Vulnerabilities where RedShift, Threat Intelligence and Condor Labs Identified and Helped Operators Protect Their Networks »

These flaws in software, hardware or firmware represent an unknown exploit in the wild that exposes a vulnerability where malicious activity, fraud and theft can occur.  These previously unknown weaknesses are often exploited and attackers release malware before a developer team can create a patch to fix the zero-day vulnerability.