Supply Chain Attack

Related blog posts

Malware Payloads & Beacons: Types of Malicious Payloads

We used a reverse_tcp communications channel facilitated by the Meterpreter payload (from the Metasploit Framework).

Malware Payloads & Beacons: How Malicious Communications Start

Understanding malware beacons and knowing how to block them can help keep your organization safer.

Related resources

No items found.

Assume Breach.
Minimize Impact.
Increase Resilience.

Ready to learn more about Zero Trust Segmentation?