A security company was able to track command and control traffic generated by hacking groups thanks to an anomaly in a pen-testing tool.
A security company was able to track command and control traffic generated by hacking groups thanks to an anomaly in a pen-testing tool.