🦹
CYBERSECURITY BOOK
Ask or search...
Ctrl + K
🧛♂️
ADVANCED PERSISTENT THREATS - RESEARCH
Command and Control
The adversary is trying to communicate with compromised systems to control them.
Previous
Collection
Next
Data exfiltration
Was this helpful?