Botconf 2025

Tricky obfuscation techniques for C2 communication? Just detect them all!

Tricky obfuscation techniques for C2 communication? Just detect them all! Botconf 2025 Thursday2025-05-22 | 10:55 – 11:35 Kseniia Naumova 🗣 Today most malware and botnets use network communication for tasks such as downloading malicious files, sending stolen data, receiving commands from the C2, etc. Researchers worldwide analyze millions of network traffic streams daily to search

Tricky obfuscation techniques for C2 communication? Just detect them all! Read More »

Scroll to Top