How does Custocy detect Command & Control attacks using DGA?

During our last Sprint, Custocy’s scientific team implemented a solution for the detection of malicious communications called “DGA” (Domain Generation Algorithm), whose goal is to hide “Command and Control” attacks. I’ll explain what it consists of and what This implies for the security of your information system. Let’s imagine that an attacker wants to establish […]