One premise of a RAND study into zero-day vulnerabilities, is that they are useful in cyber operations - whether by criminals, militaries or governments.
Researchers out to demonstrate inherent weaknesses in the SHA-1 internet security standard announced they had broken the legacy cryptographic algorithm using a so-called collision attack.