Skip to main content

Blocking C2 Communication from Compromised Device

Command-and-control infrastructure, also called C2, is employed by cyber criminals to maintain communications with compromised devices within a target network.

Download PDF