Bypassing Reputation Filters to Establish C2 Channels
This blog post details how attackers can use trusted cloud services such as Google or Amazon to bypass reputation filters and serve as a Command and Control Channel for potential attacks.
Attack, Defend, Deceive
This blog post details how attackers can use trusted cloud services such as Google or Amazon to bypass reputation filters and serve as a Command and Control Channel for potential attacks.