đŠč
CYBERSECURITY BOOK
Ctrl
K
Copy
đ§ââïž
ADVANCED PERSISTENT THREATS - RESEARCH
Command and Control
The adversary is trying to communicate with compromised systems to control them.
Previous
Collection
Next
Data exfiltration
Was this helpful?