This paper examines the common but flawed practice of implicitly assigning trust to threat indicators (or intel) that are shared by external providers. These indicators are often deployed automatically to security controls without adequate vetting, resulting in false positives and a false sense of...