By Ben Reardon
The threat actors who created SUNBURST went to extraordinary lengths to hide Command-and-Control (C2) traffic by mimicking the nature of communication patterns used by legitimate software within the SolarWinds package.
The contents of the C2 communications are ... Read more »
The Corelight Sensors page has moved! Visit:
Appliance Sensors Cloud Sensors Software Sensor Virtual Sensors
© 2021 Corelight, Inc. All rights reserved.