Source: WhataWin | Getty ImagesThreat actors have been using commercial command and control frameworks — or illegal copies of them — like Cobalt Strike, Sliver, Metasploit and others, for years to ...