An advanced cyberattack vector that exploits software vulnerabilities to compromise a device or system without requiring any action from the victim — no clicking a link, opening a file, or entering credentials. Defending against zero-click threats requires up-to-date patch management, endpoint detection and response, and proactive vulnerability assessment services.