Sunburst Webinar

Register now to learn more about how the Sunburst malware exploited DNS to execute its attack. You will also learn how Network and Security teams can leverage real-time DNS data in order to detect and defend against such threats.

Reserve your spot for this webinar

Sunburst/Solorigate Situation Briefing

January 21 @ 11AM EST

Reports indicate that the recent Sunburst/Solorigate attack impacted approximately 18k customers via trojanized updates to Solarwind’s Orion platform. Among the unique capabilities of the malware, the months-long attack made sophisticated use of DNS queries to look up Command and Control (C2) channel endpoints.

Network and Security teams are concerned about ongoing vulnerabilities, investigating the techniques used in the attack, and searching for ways to improve the defence of their critical infrastructure going forward.

In this 30-minute webinar, BlueCat CSO Andrew Wertkin and Software Security Director David Maxwell, will:

  • Explore how the Sunburst malware was able to exploit DNS in the recent attack.
  • Demonstrate how BlueCat Edge could have detected the manipulation of DNS queries and flagged the threat in advance

Speakers

Andrew Wertkin

Chief Strategy Officer

David Maxwell

Software Security Director

[pardot_form id=36689 type=”handler”]