Artwork

8.6 - C2 for Me + You

Security Noise

36 subscribers

published

iconShare
 
Manage episode 520215955 series 2423158
Content provided by TrustedSec. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by TrustedSec or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://staging.podcastplayer.com/legal.

Attackers and threat actors use command and control techniques, also known as C2, to gain access to networks and communicate with compromised devices. On this episode of Security Noise, Geoff and Skyler are joined by Principal Research Analyst Scott Nusbaum to discuss C2 techniques. Listen as they cover how different types of attackers typically use C2, how that differs from what pentesters and red teamers are using, techniques for blending into cloud environments, and the ever-growing role of AI in C2 systems. How can blue teams work to detect C2s before threat actors take control? Learn ways to reduce your risk in this episode!

About this podcast: Security Noise, a TrustedSec Podcast hosted by Geoff Walton and Producer/Contributor Skyler Tuter, features our cybersecurity experts in conversation about the infosec topics that interest them the most. Find more cybersecurity resources on our website at https://trustedsec.com/resources.

  continue reading

115 episodes