Zero-Day Exploitation

Active exploitation of a previously undisclosed vulnerability with no public patch or signature, requiring behavioral hunting, vendor coordination, and compensating controls.

No procedures are assigned to this incident type yet.