Attack Flow: Illuminating the Anatomy of Cyber Threats