Author: Ken Todd Threat Intelligence Researcher, ThreatConnect