Identify anomalous/malicious activity based on DNS activity and known attacker infrastructure.
Created by James Mason | SE @ Huntress
·