Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Exploiting Legit APIs for Covert C2 - A New Perspective on Cloud-based Malware Operations

Cooper via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Learn how cybercriminals exploit legitimate cloud APIs to establish covert command and control (C2) channels in this 30-minute security presentation by Cooper. Discover the emerging tactics used by malware operators to abuse trusted cloud services and APIs for malicious communications, bypassing traditional security detection methods. Explore the technical mechanisms behind these attacks, understand how legitimate cloud infrastructure can be weaponized for malicious purposes, and examine the challenges this presents for cybersecurity professionals. Gain insights into the evolving landscape of cloud-based malware operations and the innovative approaches attackers use to maintain persistent, stealthy communication channels with their malicious payloads.

Syllabus

Exploiting Legit APIs For Covert C2: A New Perspective On Cloud-based Malware Operations- Cocomelonc

Taught by

Cooper

Reviews

Start your review of Exploiting Legit APIs for Covert C2 - A New Perspective on Cloud-based Malware Operations

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.