The decades-old "finger" command is making a comeback,, with threat actors using the protocol to retrieve remote commands to ...