Alerts
Events
DCR
Explore Cyware Products
Alerts
Events
DCR
Go to listing page
CISA Releases New ‘CHIRP’ Tool to Detect SolarWinds Post-Compromise Malicious Activity
Incident Response, Learnings
March 19, 2021
Bleeping Computer
CISA Hunt and Incident Response Program (CHIRP), the new forensics collection tool, is a Python-based tool that helps detect SolarWinds malicious activity IOCs on Windows operating systems.
Read More
CISA Advisory
CISA Hunt and Incident Response Program (CHIRP)
SolarWinds attack
Forensics Collection Tool
Malicious Activity Detection
Publisher
Previous
BlackRock Android trojan Poses as Clubhouse App to Stea ...
Malware and Vulnerabilities
Next
Ongoing Office 365-themed phishing campaign targets exe ...
Identity Theft, Fraud, Scams