Several of the subscription AV products include frequent live updates as new threats are discovered. If a virus is seen and reported with a new and different signature, the detection criteria are downloaded within hours to all customers who are online.
I saw one instance, years ago, where the shared files disk for a server had started encrypting the files and folders. It started it seems in alphabetical order and had done folders starting with A to C before it stopped - presumably at that point, the AV began to recognize this virus or its pattern.
What matters is the manner of delivery, too. Many of the problems nowadays are links that people click on, often emails. Spam and AV filters on email servers need to be up to date. (Also, your PC should be as up to date as possible) Sometimes, there’s a novel exploit route - I saw a note recently that WinRAR has had a vulnerability to allow code to execute when trying to unpack JPG and PDF files.
In order to infect the Windows PCs in the Natanz facility, Stuxnet exploited no fewer than four zero-day bugs—a Windows Shortcut flaw, a bug in the print spooler, and two escalation of privilege vulnerabilities—along with a zero-day flaw in the Siemens PLCs and an old hole already used in the Conficker attack. The sheer number of vulnerabilities exploited is unusual, as typically zero-days are quickly patched in the wake of an attack and so a hacker won’t want to reveal so many in a single attack.
But apparently to get in, it used a USB connection (The Iranian facility was not accessible by internet).
I suppose anothe point for the OP is that I haven’t heard much about compromised home routers lately; so someone seeking to load a virus onto your PC needs that you somehow get them connected - web, email, download…
Another vulnerability mentioned is IoT - all those devices like Ring Doorbells, Smart TVs, Nest therrmostats, etc. that automagically connect to outside servers behind your back. Usually those have a fixed programming and sometimes don’t update themselves. If someone can figure out a way to connect remote to that, they now have a live connection on your network from which to try and infiltrate your PC, even from a very simple method like hacking your passwords.