Threat hunting with Osquery, Part 2 – Command and Control
Part 2 – Command and Control After gaining initial access to a device, the attackers try to establish command and control (C&C, C2) over the device with the aim to use it in following stages of the attack.