Identify anomalous/malicious activity based on DNS activity and known attacker infrastructure.
Created by James Mason | PMM @ Huntress
·