Source: Computer Weekly
12 Dec 2018

As attackers begin to use multiple command and control systems to communicate with backdoors and other malware, how can organisations ensure that they detect such methods and that all C&C systems are removed, including “sleepers” designed to be activated at a future date?

There are several different command and control (C&C) communication techniques used by adversaries to issue instructions remotely and maintain control of an organisation’s compromised systems – a crucial stage in the cyber attack chain (also known as the cyber kill chain).

Read Full Article