By Ben Reardon
The threat actors who created SUNBURST went to extraordinary lengths to hide Command-and-Control (C2) traffic by mimicking the nature of communication patterns used by legitimate software within the SolarWinds package.
The contents of the C2 communications are ... Read more »
Info Security Products Guide Global Excellence - Gold
Network Visibility, Security & Testing
Cybersecurity Excellence Award Gold
Network Traffic Analysis
Cyber Defense Magazine Cutting Edge Award
Network Security and Management
Channel Chiefs 2020 - Scott Hoard
Top 19 Open Source Software Startups to Watch
Cybersecurity Excellence Award Silver
© 2021 Corelight, Inc. All rights reserved.