Security analysts spot “first publicly documented case” of a popular open-source tool being used to stage a network intrusion ...