Traffic from command-and-control (C2) servers is an indication of attack risk or compromise potential. Tracking live C2 data reveals victim hotspots and activity hubs for malicious actors. This infographic from Level3 provides an analysis of traffic from command-and-control (C2) servers within Europe in the last year.
Jon Collins’ in-depth look at tech and society
Kathryn Cave looks at the big trends in tech