Uncovering Stealthy Threat Actors: The Blending Technique Explained