URL has been copied successfully!
Cybercriminals Exploit Pyramid Pentesting Tool for Covert C2 Communications
URL has been copied successfully!

Collecting Cyber-News from over 60 sources

Cybercriminals Exploit Pyramid Pentesting Tool for Covert C2 Communications

Cybersecurity analysts have identified that hackers are leveraging the open-source Pyramid pentesting tool to establish stealthy command-and-control (C2) communications. Originally designed as a post-exploitation framework for penetration testers, Pyramid has become an attractive option for malicious actors due to its ability to evade detection by endpoint security tools. The tool, first released on GitHub in […] The post Cybercriminals Exploit Pyramid Pentesting Tool for Covert C2 Communications appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

First seen on gbhackers.com

Jump to article: gbhackers.com/cybercriminals-exploit-pyramid-pentesting-tool/

Loading

Share via Email
Share on Facebook
Tweet on X (Twitter)
Share on Whatsapp
Share on LinkedIn
Share on Xing
Copy link