It seems like your browser didn't download the required fonts. Please revise your security settings and try again.
Barracuda XDR

Barracuda Campus is getting an upgrade!

We are excited to announce that Barracuda Campus will migrate to a new platform around mid-January 2026. Please see the announcement on the Campus Dashboard to find out more.

Simulating Network Monitoring Threats

  • Last updated on

The use case for this simulation is traffic detecting communication with a Malware IP address.

Malicious actors do not just enter your network quietly. Cyber attacks intend to exfiltrate data. Monitoring for unusual traffic patterns leaving a network is a primary indicator of a compromise. Compromised systems often “talk” to the command-and-control servers that provide commands to infected devices & these devices communicate to known Indicators of Compromise IOCs (Website/IPs).

Test Workflow
Networking Monitoring 1.png
How to Test
  • From the network where you are spanning traffic, in the device's browser, navigate to cuda-labs.com.

This triggers a Barracuda XDR alarm that detects network traffic to the Malware Testing IP address.

Simulating Other Threats

You can simulate the following threats: