Lifting the lid on how the threat intelligence graph in CTI Butler created.