Command and control (C2)

    0
    25

    The techniques used by malicious actors to maintain communications with compromised systems