Detecting the Impossible: Serverless C2 in the Cloud
There are certain sophisticated threat behaviors that are generally considered “impossible” to detect on the network, which are both tedious and challenging for security teams to protect against. These include the use of encryption by attackers, filel… Continue reading Detecting the Impossible: Serverless C2 in the Cloud