Watch this on-demand session to learn about:

  • Events leading up to the discovery of RedEcho
  • Using network traffic analysis for technical identification and analysis
  • Determining clear patterns of cyber activity relating to China-linked groups