Unsolicited Communications events are discovered using data collected by:
- Software installed on edge devices across the globe.
- Monitoring darknet traffic. This consists of IP addresses that are not hosting any useful services, but are passively collecting information about devices that attempt to connect to them. Many of these communication attempts are detailed in firewall logs, and then aggregated.
We only present information about Unsolicited Communications events if the traffic hits one of our sinkholes or honeypots.
We’ve developed our own in-house sensor network, providing higher confidence data telemetry on more organizations and additional visibility into a large number of malware infections that can be hard to detect via other means.
We started feeding these data into the Bitsight Security Ratings Platform on March 30, 2021 into the Unsolicited Communications risk vector, allowing us to improve the data quality and breadth of the data, and also achieve high-confidence telemetry.
- March 2, 2021: Improved data quality.
- January 15, 2020: Published.
Feedback
0 comments
Please sign in to leave a comment.