Which type of malware takes advantage of a security vulnerability on the same day that the vulnerability becomes known to the public?