ThreatIntell by Pablo Delgado on August 26, 2017 in Previous article Detecting Outbound connections Pt. 2 – Logstash + Threat Intelligence