Skip to main content

Blocking C2 Communication from Compromised Internal Devices

Command-and-control infrastructure, also called C2, is employed by cyber criminals to maintain communications with compromised devices within a target network.

Download PDF

Command-and-control infrastructure, also called C2, is employed by cyber criminals to maintain communications with compromised devices within a target network.