Beacon Analysis – The Key to Cyber Threat Hunting