Exploiting Legit APIs for Covert C2 - A New Perspective on Cloud-based Malware Operations

Exploiting Legit APIs for Covert C2 - A New Perspective on Cloud-based Malware Operations

Cooper via YouTube Direct link

Exploiting Legit APIs For Covert C2: A New Perspective On Cloud-based Malware Operations- Cocomelonc

1 of 1

1 of 1

Exploiting Legit APIs For Covert C2: A New Perspective On Cloud-based Malware Operations- Cocomelonc

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Exploiting Legit APIs for Covert C2 - A New Perspective on Cloud-based Malware Operations

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Exploiting Legit APIs For Covert C2: A New Perspective On Cloud-based Malware Operations- Cocomelonc

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.