“Exploiting Legit APIs for Covert C2: A New Perspective on Cloud-based Malware Operations”

Feedback is a valuable tool for speakers to improve their content and presentation. Even short feedback can prove valuable to a speaker! Please take the time and communicate your thoughts in a constructive way. Thanks, we (and our speakers) appreciate your feedback!