Zero-day vulnerabilities constitute a constant challenge to organizations of all sizes. These hitherto unknown weaknesses in software and hardware can be exploited by malicious actors before patches are available, enabling swift and devastating attacks. The dynamic nature of cybercrime means that discovering and mitigating these vulnerabilities is