• Resources
  • SUNBURST/Solorigate Situation Briefing

SUNBURST/Solorigate Situation Briefing

BlueCat leaders discuss how the malware attack via SolarWind’s Orion platform exploited DNS and how BlueCat Edge could have helped to detect it.

Reports indicate that the recent SUNBURST/Solorigate attack impacted approximately 18,000 customers via trojanized updates to SolarWind’s Orion platform.

In this 50-minute webinar, BlueCat’s Chief Strategy Officer Andrew Wertkin and Software Security Director David Maxwell, will:

  • Explore how the Sunburst malware was able to exploit DNS in the recent attack.
  • Demonstrate how BlueCat Edge could have helped detect the manipulation of DNS queries and flagged the threat in advance.

You can also read more in BlueCat’s customer situation brief on SUNBURST/Solorigate.

BlueCat acquires Men&Mice and Indeni to add important capabilities in DDI orchestration and network infrastructure resiliency to improve visibility and management of networks.Learn more