Skip to content
Threat Note Threat Note

Aggregating Cyber Insights

  • Articles
  • Breaches
  • Learning
  • News
  • Podcast
  • Research
  • Toolkit
  • Vulnerabilities
  • Webinars
  • About Us

HTTPS C2 communication

  • Home
  • HTTPS C2 communication
From Cyber Security News – 1M+ Malware Samples Analysis Reveal Application Layer Abused for Stealthy C2
Posted inNews

From Cyber Security News – 1M+ Malware Samples Analysis Reveal Application Layer Abused for Stealthy C2

 A recent analysis of over 1 million malware samples unveiled a trend where adversaries increasingly exploit the Application Layer of the Open System Interconnection (OSI) model to conduct stealthy Command-and-Control…
Posted by shaikh Saqib February 10, 2025

Latest Posts

  • From Schneier on Security – Friday Squid Blogging: Giant Squid Live in the Waters of Western AustraliaMay 9, 2026
  • From Dark Reading – ShinyHunters Claims Second Attack Against InstructureMay 9, 2026
  • From Cyber Security News – New PamDOORa Backdoor Attacking Linux Systems to Steal SSH CredentialsMay 9, 2026
  • From Cyber Security News – Hackers Deploy Modular RAT With Credential Theft and Screenshot Capture CapabilitiesMay 9, 2026
  • From The Hacker News – TCLBANKER Banking Trojan Targets Financial Platforms via WhatsApp and Outlook WormsMay 8, 2026
Total Visitors
1502188

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • February 2023
  • December 2022
  • November 2022
  • May 2022
Copyright 2026 — Threat Note. All rights reserved. Bloghash WordPress Theme
Scroll to Top