Skip to Main Content
All Trimarc services are now delivered through TrustedSec! Learn more

Security Noise - C2 for Me + You

Episode 8.6

By Geoff Walton, Skyler Tuter and Scott Nusbaum
November 19, 2025
Research Penetration Testing

Attackers and threat actors use command and control techniques, also known as C2, to gain access to networks and communicate with compromised devices. On this episode of Security Noise, Geoff and Skyler are joined by Principal Research Analyst Scott Nusbaum to discuss C2 techniques. Listen as they cover how different types of attackers typically use C2, how that differs from what pentesters and red teamers are using, techniques for blending into cloud environments, and the ever-growing role of AI in C2 systems. How can blue teams work to detect C2s before threat actors take control? Learn ways to reduce your risk in this episode!

About this podcast:

Security Noise, a TrustedSec Podcast hosted by Geoff Walton and Producer/Contributor Skyler Tuter, features our cybersecurity experts in conversation about the infosec topics that interest them the most. Find more cybersecurity resources on our website at https://trustedsec.com/resources.