Security Feed
  1. Archives

Aug 06 2025 New Ghost Calls tactic abuses Zoom and Microsoft Teams for C2 operations

Source

A new post-exploitation command-and-control (C2) evasion method called 'Ghost Calls' abuses TURN servers used by conferencing apps like Zoom and Microsoft Teams to tunnel traffic through trusted infrastructure. [...]

Posted by Bill Toulas on Wed 06 August 2025 in BleepingComputer.

Tags: Security.

Categories

  1. Ars Technica
  2. AWS Security
  3. BleepingComputer
  4. Brian Krebs
  5. Bruce Schneier
  6. GCP Security
  7. Google Project Zero
  8. The Daily Swig
  9. The Guardian
  10. The Register
  11. Threatpost

Tag cloud

  • Security
  • Uncategorized
  • Security, Identity, & Compliance
  • Biz & IT
  • Security Blog
  • Microsoft
  • Security & Identity
  • Google
  • cryptocurrency
  • AI
  • Announcements
  • Foundational (100)
  • A Little Sunshine
  • Legal
  • Apple
  • Artificial Intelligence
  • privacy
  • Mobile
  • squid
  • Advanced (300)
  • Intermediate (200)
  • The Coming Storm
  • hacking
  • Technical How-to
  • Best Practices

Security Feed. Powered by Pelican and m.css. Code is available on GitLab.