Listen "8.6 - C2 for Me + You"
Episode Synopsis
Attackers and threat actors use command and control techniques, also known as C2, to gain access to networks and communicate with compromised devices. On this episode of Security Noise, Geoff and Skyler are joined by Principal Research Analyst Scott Nusbaum to discuss C2 techniques. Listen as they cover how different types of attackers typically use C2, how that differs from what pentesters and red teamers are using, techniques for blending into cloud environments, and the ever-growing role of AI in C2 systems. How can blue teams work to detect C2s before threat actors take control? Learn ways to reduce your risk in this episode! About this podcast: Security Noise, a TrustedSec Podcast hosted by Geoff Walton and Producer/Contributor Skyler Tuter, features our cybersecurity experts in conversation about the infosec topics that interest them the most. Find more cybersecurity resources on our website at https://trustedsec.com/resources.
More episodes of the podcast Security Noise
8.5 - Footprint Discovery for Red Teamers
03/11/2025
8.3 - Cybersecurity Awareness Month 2025
06/10/2025
8.1 - Hacker Summer Camp
08/09/2025
7.18 - Hacking with AI
16/06/2025
7.17 - RE: Active Directory
02/06/2025
7.16 - What the DIT?
12/05/2025
7.15 - Trust Me, at Least This Week!
28/04/2025
ZARZA We are Zarza, the prestigious firm behind major projects in information technology.