By Ben Reardon – December 21, 2020
The threat actors who created SUNBURST went to extraordinary lengths to hide Command-and-Control (C2) traffic by mimicking the nature of communication patterns used by legitimate software within the SolarWinds package. Read more »
By John Gamble – December 14, 2020
UPDATE 12-16-20: Corelight Resources Read more »