Unveiling Hidden Links Between Unseen Security Entities