Malware authors are increasing their use of peer-to-peer protocols for command and control, making detection more difficult, according to advanced threat protection vendor Damballa.
Many enterprises have installed defenses that can detect when external, centralized command and control
