Theregister6 days agoInformation securityMove over, Cobalt Strike, there's a new post-exploit toolNew post-exploitation tool Splinter enables attackers to execute malicious commands and remains undetected by self-deleting after use. [ more ]