In favor of similar frameworks less familiar to threat actors, threat actors are ditching Cobalt Strike penetration testing. There has been a surge of interest recently in an open-source, cross-platform kit called Sliver that has emerged after Brute Ratel. By analyzing the toolkit, its operation, and its components, hunting queries can be used to detect […]
The post Threat Actors Moving to Sliver Command-and-Control (C2) to Evade Detection appeared first on GBHackers On Security.
This article has been indexed from GBHackers On Security
Read the original article: