Command and control (C2)

    0
    12

    The techniques used by malicious actors to maintain communications with compromised systems