Detecting Abuse of VSCode Remote Tunnels
Detecting abuse of VSCode Remote Tunnels for C2 and persistence by threat actors
Threat Hunting vscode remote tunnels detection
Detecting abuse of VSCode Remote Tunnels for C2 and persistence by threat actors
How threat actors abuse Microsoft Dev Tunnels for C2 communication and detection strategies
A practical guide to implementing threat hunting in a SOC environment and moving beyond reactive detection