Network and endpoint defense technologies will have to either rapidly update signatures or use other investigative ways to detect command and control (C2). Uncover how threat actors evade security tools to execute C2 techniques to learn about what you should look for.
Read MoreBlog Authors
Joshua St. Hilaire

Joshua St. Hilaire
Principal Security Researcher
Joshua St.Hilaire is currently a Principal SecurityResearcher at Vectra where he currently leads research on adversarial detection models. He has twenty years of experience in computer security focused on incident response, threat hunting and reverse-engineering.
Posts from
Joshua St. Hilaire

Command and Control (C2) Evasion Techniques, Part 2

Command and Control (C2) Evasion Techniques
Learn how Command and Control (C2) frameworks are continuing to evolve in order to evade detection. Here we will examine a method known as JA3 signature randomization.
Read More