command and control

1 Article
ICTKB_IMG

Command and Control (C2)

Malicious network attacks have been on the rise in the last decade. One of the most damaging attacks, often executed over DNS, is accomplished through command and control (C2). Command-and-control attacks can compromise an entire network. The...

Our site uses cookies. By using this site, you agree to the Privacy Policy and Terms of Use.