This isn't only research data. This is a down-the-rabbit-hole technical guide on how to:
Improve risk management and scoring
Stay ahead of morphing malware, like botnet families and old threats made new again
Address architecture issues, like VPN abuse and XSS
Better address host security, specifically Kubernetes