Or, why the software supply chain should be treated as critical infrastructure with guardrails built in at every layer.
"The C2 hosts a web-based graphical user interface (GUI) titled 'NEXUS Listener' that can be used to view stolen information ...