A note on the SolarWinds SUNBURST Attack

A skilled and motivated attacker will often find a way to penetrate despite multiple layers of well designed and implemented controls. When an attack like this one or the FireEye breach comes to light, often the first thought is to implement new NIDS, EDR, or AVS signatures specific to the documented attack. Naturally, that’s a … Read more