Binary Defense Blog

Read the latest cybersecurity news and insights from our industry experts

Featured Post

Featured

Detecting Ransomware’s Stealthy Boot Configuration Edits

Written By: Binary Defense Threat Researcher @shade_vx This blog post focuses on threat hunting …

Subscribe to the Blog

View All Posts

12 Essentials for a Successful SOC Partnership

As cyber threats continue to impact businesses of all sizes, the need for round-the-clock security monitoring also grows. …

View

Cyber War: Hackers’ Transformation from Cyber Criminals to Hacktivists

Written by: Nataliia Zdrok, Threat Intelligence Analyst at Binary Defense Russia’s invasion of Ukraine increased malicious cyber activity …

View

The war in Ukraine and its impact on how China views Taiwan

By Anthony Zampino Introduction Leading up to the most recent Russian invasion of Ukraine in February 2022, analysts …

View

Digging through Rust to find Gold: Extracting Secrets from Rust Malware

By: Matt Ehrnschwender (@M_alphaaa) Threat actors have begun migrating from older and well-known compiled languages such as C/C++ …

View

5 Critical Criteria for evaluating Managed Detection & Response (MDR)

When evaluating a Managed Detection & Response (MDR) service there are 5 critical components that you should focus …

View

Using Microsoft Sentinel to Detect Confluence CVE-2022-26134 Exploitation  

By Akshay Rohatgi and Randy Pargman About this Student Research Project Binary Defense’s mission is to make the …

View