While there are many legitimate uses for this software, adversaries are also finding ways to use them for command and control in their campaigns.
This article has been indexed from Cisco Talos Blog
While there are many legitimate uses for this software, adversaries are also finding ways to use them for command and control in their campaigns.