Command and Control Techniques | Cybersecurity Threats | Web Conferencing Exploits Recent “Ghost Calls” attacks exploit web conferencing tools for secret command and control operations.