How to Leverage Log Services to Analyze C&C Traffic

I published an article on How to Leverage Log Services to Analyze C&C Traffic
on the Security Intelligence blog.

This article describes what can cause C2 traffic, the different types of C2 traffic and what log sources that you can use to detect the C2 traffic caused by malware.

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.