Security researchers have unveiled a sophisticated new attack technique called “Ghost Calls” that exploits popular web conferencing platforms to establish covert command-and-control (C2) channels, effectively turning trusted business communication tools into hidden pathways for cybercriminals. The technique, presented by Adam Crosser from Praetorian at Black Hat USA 2025, demonstrates how attackers can abuse the TURN […]
The post ‘Ghost Calls’ Attack Exploits Web Conferencing as Hidden Command-and-Control Channel appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
This article has been indexed from GBHackers Security | #1 Globally Trusted Cyber Security News Platform
Read the original article: