Leveraging threat intelligence to investigate suspicious activity