By Ben Reardon
The threat actors who created SUNBURST went to extraordinary lengths to hide Command-and-Control (C2) traffic by mimicking the nature of communication patterns used by legitimate software within the SolarWinds package. The contents of the C2 communications are ... Read more »
The Corelight Sensors page has moved! Visit: Appliance Sensors Cloud Sensors Software Sensor Virtual Sensors