Further reading
Following are some bonus reading materials for you to check out:
- CrowdStrike article explaining command and control attacks, how they work, and ways to defend against them: https://www.crowdstrike.com/cybersecurity-101/cyberattacks/command-and-control/
- SentinelOne overview of command and control servers, their role in cyberattacks, and detection strategies: https://www.sentinelone.com/cybersecurity-101/threat-intelligence/what-are-command-control-c2-servers/
- Fortinet glossary entry defining command and control attacks and outlining key concepts: https://www.fortinet.com/resources/cyberglossary/command-and-control-attacks
- Tripwire blog post detailing what command and control attacks are and how to protect against them: https://www.tripwire.com/state-of-security/what-are-command-and-control-attacks
- Optiv cybersecurity dictionary definition of command and control (C2): https://www.optiv.com/cybersecurity-dictionary/c2-command-and-control
- Splunk...