Supply Chain Attack
Related blog posts

Malware Payloads & Beacons: Types of Malicious Payloads
We used a reverse_tcp communications channel facilitated by the Meterpreter payload (from the Metasploit Framework).

Malware Payloads & Beacons: How Malicious Communications Start
Understanding malware beacons and knowing how to block them can help keep your organization safer.
Related resources
No items found.
Assume Breach.
Minimize Impact.
Increase Resilience.
Ready to learn more about Zero Trust Segmentation?