Binary Defense Blog

Read the latest cybersecurity news and insights from our industry experts

Featured Post

Featured

Detecting Ransomware’s Stealthy Boot Configuration Edits

Written By: Binary Defense Threat Researcher @shade_vx This blog post focuses on threat hunting …

Subscribe to the Blog

View All Posts

Get To Know Bob Meindl, Our New CEO! 

In May of this year, we announced that well-known cybersecurity expert, Bob Meindl, joined Binary Defense as the …

View

Detecting Follina Exploits Using a Remote Answer File 

By: Matt Ehrnschwender (@M_alphaaa)  A vulnerability in the Microsoft Support Diagnostic Tool (MSDT), dubbed “Follina” (CVE-2022-30190) has been …

View

4 Tactics to Detect & Contain Emotet’s Latest Evolution 

Emotet’s latest evolution is bypassing old detection techniques.   In Mid-April, the Emotet botnet significantly increased its volume …

View

War in Ukraine and Its Impact on Hackers

The Russian invasion of Ukraine started on February 24th, and no one was left indifferent. Cybercriminals are divided …

View

Breaking Down Password Storage Breakdowns

Written By: Kim McAloon Hunting for Password Files on Endpoints As part of the Okta compromise, it was announced …

View

Dark Web Reactions to Russia’s Invasion of Ukraine

Tensions continue to escalate around the globe as the world watches Ukraine fight off a Russian invasion. Several …

View