The time to fix a security flaw is before it’s exploited — just ask the Clinton campaign or the World Anti-Doping Agency. So Arizona State University’s Paulo Shakarian tracks cyber threats to their origins: In the hard-to-access deep web and the secretive dark web.