Aug. 25, 2023, 8:57 a.m. | Xavier

/dev/random blog.rootshell.be

Today, I published the following diary on isc.sans.edu: “Python Malware Using Postgresql for C2 Communications“: For modern malware, having access to its C2 (Command and control) is a crucial point. There are many ways to connect to a C2 server using tons of protocols, but today, HTTP remains very common


The post [SANS ISC] Python Malware Using Postgresql for C2 Communications appeared first on /dev/random.

access c2 command command and control communications connect control edu http isc malware modern malware point postgresql protocols python sans sans.edu sans internet storm center sans isc security server today

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Corporate Intern - Information Security (Year Round)

@ Associated Bank | US WI Remote

Senior Offensive Security Engineer

@ CoStar Group | US-DC Washington, DC