Hiding In Plain Sight: Unique Methods Of C2 From Infostealers
DISCARDED: Tales From the Threat Research Trenches - A podcast by Proofpoint - Tuesdays

Categories:
Network-based detections, such as those developed by threat detection engineers using tools like suricata and snort signatures, play a crucial role in identifying and mitigating cyber threats by scrutinizing and analyzing network traffic for malicious patterns and activities. Today’s guest is Isaac Shaughnessy, a Threat Detection Engineer at Proofpoint. Isaac shares his insights into the challenges of detecting and mitigating malware, especially those using social platforms for command and c...