E-Mail-Eintrag: Operationalizing threat intelligence