SolarWinds: How a Rare DGA Helped Attacker Communications Fly Under the Radar
In the second of a series of follow-up analysis on the SolarWinds attacks, we examine how the attackers made command and control communications particularly stealthy.
SolarWinds Attacks: Stealthy Attackers Attempted To Evade Detection
In the first of a series of follow-up analysis on the SolarWinds attacks, we take a look at how the attackers disabled security software and avoided detection