Zero-Day Exploitation
Active exploitation of a previously undisclosed vulnerability with no public patch or signature, requiring behavioral hunting, vendor coordination, and compensating controls.
No procedures are assigned to this incident type yet.