Threat Research
Field Notes on Malware: The Evolution of C2 Evasion and What It Means for Detection
While malware developers continue using BOFs, shellcode, and sleep obfuscation, a capability researched and published almost 2 years ago has surprisingly not gained traction. Understanding these techniques is critical for defenders.
Nov 26•7 min read•Rad Kawar