Threat Actors Moving to Sliver Command-and-Control (C2) to Evade Detection

Threat Actors Moving to Sliver

In favor of similar frameworks less familiar to threat actors, threat actors are ditching Cobalt Strike penetration testing. There has been a surge of interest recently in an open-source, cross-platform kit called Sliver that has emerged after Brute Ratel. By analyzing the toolkit, its operation, and its components, hunting queries can be used to detect […]

The post Threat Actors Moving to Sliver Command-and-Control (C2) to Evade Detection appeared first on GBHackers On Security.

This article has been indexed from GBHackers On Security

Read the original article: