Once the guardian angels of IT systems, remote monitoring and management (RMM) tools have become the Trojan horses of choice for savvy attackers. Attackers are increasingly abusing legitimate network ...