From Threat Intel to Threat Validation