Sunburst: Supply Chain Attack Targets SolarWinds Users
A number of Symantec customers affected by wide-ranging trawl for potential targets of interest.
View ArticleSolarWinds Attacks: Stealthy Attackers Attempted To Evade Detection
In the first of a series of follow-up analysis on the SolarWinds attacks, we take a look at how the attackers disabled security software and avoided detection
View ArticleHow SES Complete Can Protect Against Sophisticated Attacks Such As Sunburst
Symantec Endpoint Security Complete addresses your blind spots
View ArticleSolarWinds: How a Rare DGA Helped Attacker Communications Fly Under the Radar
In the second of a series of follow-up analysis on the SolarWinds attacks, we examine how the attackers made command and control communications particularly stealthy.
View ArticleSolarWinds: Insights into Attacker Command and Control Process
In the third of a series of follow-up analysis on the SolarWinds attacks, we investigate how the attackers controlled the Sunburst malware.
View ArticleRaindrop: New Malware Discovered in SolarWinds Investigation
Tool was used to spread onto other computers in victims’ networks.
View ArticleSolarWinds: How Sunburst Sends Data Back to the Attackers
In the fourth of a series of follow-up analysis on the SolarWinds attacks, we detail how data is sent to the attackers.
View Article