Anatomy of the SolarWinds Attack: Five Types of Malware
The SUNBURST threat actor(s) developed multiple types of malware to conduct the SolarWinds attack - here's a breakdown of what they do and how they worked together to penetrate the world's most secure networks.
Read MoreHow to Detect & Protect Against the SUNBURST Backdoor
Here's how to mitigate, detect indicators of compromise and protect against the latest SolarWinds supply chain attack and SUNBURST backdoor.
Read More