Aug. 24, 2022, 4 p.m. | Paul Oliveria

Microsoft Security Blog www.microsoft.com

Threat actors evade detection by adopting the Sliver command-and-control (C2) framework in intrusion campaigns.


The post Looking for the ‘Sliver’ lining: Hunting for emerging command-and-control frameworks appeared first on Microsoft Security Blog.

command control cybersecurity frameworks hunting managed threat hunting microsoft security intelligence sliver

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Information Security Engineers

@ D. E. Shaw Research | New York City

Staff DFIR Investigator

@ SentinelOne | United States - Remote

Senior Consultant.e (H/F) - Product & Industrial Cybersecurity

@ Wavestone | Puteaux, France

Information Security Analyst

@ StarCompliance | York, United Kingdom, Hybrid

Senior Cyber Security Analyst (IAM)

@ New York Power Authority | White Plains, US