Detecting C&C Server Communications – Context is Key

by Israel Aloni

posted at November 29, 2016

By now, the concept of the cyber Attack Chain (or kill chain) is widely accepted as a way to understand and deal with threats. Just to refresh your memory, here is Gartner’s take: Source: Gartner As you can see, the first thing that malware does once it’s established on the network is call home –