Command and control (C2)

    0
    27

    The techniques used by malicious actors to maintain communications with compromised systems