What is Beaconing?
July 4, 2022
Topics
- Cybersecurity
- Threat Hunting
It’s evident that cybersecurity professionals can’t defeat adversaries by relying solely on SIEM solutions. Traditionally, a lot of focus was placed on SIEM solutions as a tool to detect anomalous activities based on its signature matching technique, but this approach is becoming antiquated as APTs are using more sophisticated attacks to gain access to systems.
As adversaries keep finding new ways to hide their presence in a network, defenders must also adopt new techniques to detect threats that masquerade as normal network activity. One way to achieve this goal is by detecting C2 beaconing.