Binary Defense Blog

Read the latest cybersecurity news and insights from our industry experts

Featured Post


Detecting Ransomware’s Stealthy Boot Configuration Edits

Written By: Binary Defense Threat Researcher @shade_vx This blog post focuses on threat hunting …

Subscribe to the Blog

View All Posts

12 Essentials for a Successful SOC Partnership

As cyber threats continue to impact businesses of all sizes, the need for round-the-clock security monitoring also grows. …


Cyber War: Hackers’ Transformation from Cyber Criminals to Hacktivists

Written by: Nataliia Zdrok, Threat Intelligence Analyst at Binary Defense Russia’s invasion of Ukraine increased malicious cyber activity …


The war in Ukraine and its impact on how China views Taiwan

By Anthony Zampino Introduction Leading up to the most recent Russian invasion of Ukraine in February 2022, analysts …


Digging through Rust to find Gold: Extracting Secrets from Rust Malware

By: Matt Ehrnschwender (@M_alphaaa) Threat actors have begun migrating from older and well-known compiled languages such as C/C++ …


5 Critical Criteria for evaluating Managed Detection & Response (MDR)

When evaluating a Managed Detection & Response (MDR) service there are 5 critical components that you should focus …


Using Microsoft Sentinel to Detect Confluence CVE-2022-26134 Exploitation  

By Akshay Rohatgi and Randy Pargman About this Student Research Project Binary Defense’s mission is to make the …