The same open-source tools that help security teams prioritize risk and enhance security outcomes can be misused by threat actors for nefarious purposes. [ https://www.rapid7.com/blog/post/pt-identifying-and-mitigating-potential-velociraptor-abuse/ ]