By Ben Reardon
The threat actors who created SUNBURST went to extraordinary lengths to hide Command-and-Control (C2) traffic by mimicking the nature of communication patterns used by legitimate software within the SolarWinds package.
The contents of the C2 communications are ... Read more »
Automation gives defenders a scalable, iterative way to
build and sustain strategic advantage. With SOAR playbooks
powered by Corelight network data, you can finally manage
your workload, empower your team, and focus on high-priority
Automate data-gathering and alert disposal to save
Improve decision quality across an inconsistent analyst
Grow needed critical skill sets faster on the job
Watch the webinar
© 2021 Corelight, Inc. All rights reserved.