8 Results
Threat Hunter TeamSymantec
Posted: 3 Min Read

SolarWinds: How Sunburst Sends Data Back to the Attackers

In the fourth of a series of follow-up analysis on the SolarWinds attacks, we detail how data is sent to the attackers.

SolarWinds: How Sunburst Sends Data Back to the Attackers
Threat Hunter TeamSymantec
Posted: 5 Min Read

SolarWinds: Insights into Attacker Command and Control Process

In the third of a series of follow-up analysis on the SolarWinds attacks, we investigate how the attackers controlled the Sunburst malware.

SolarWinds: Insights into Attacker Command and Control Process
View More