How To Identify Unseen Threats