A decades-old threat command is making a comeback - so don't let the "finger" of doom affect you
A legacy network command resurfaces in malicious campaigns, exploiting users to execute hidden Python programs and steal data.
<ul><li>The "finger" command remains exploitable for remote code execution even after years of disuse</li><li>Attackers use batch scripts to channel server responses directly into Windows command ses… [+3364 chars]