Command and Control Servers: Fundamentals
Command and Control Servers (C2s) are the brains of the malware operation. Learn more about how they work in our blog.
Reputation Jacking: Unknown Threats on Well-Known Sites
Threat actors place malicious content on trusted sites to gain access to user’s devices and spread malware. Instead of an outside attack, they wait for the victim to download software from a trusted source or otherwise insinuate themselves into a normal operation.