Skip to content
InfosecToday.com
  • Cybersecurity Glossary
InfosecToday.com

Web Conferencing Exploits

Recent “Ghost Calls” attacks exploit web conferencing tools for secret command and control operations.
Command and Control Techniques  | Cybersecurity Threats | Web Conferencing Exploits

Recent “Ghost Calls” attacks exploit web conferencing tools for secret command and control operations.

© 2025 InfosecToday.com - WordPress Theme by Kadence WP

  • Cybersecurity Glossary
Search