Binary Defense Blog

Read the latest cybersecurity news and insights from our industry experts

Featured Post

Featured

Detecting Ransomware’s Stealthy Boot Configuration Edits

Written By: Binary Defense Threat Researcher @shade_vx This blog post focuses on threat hunting …

Subscribe to the Blog

View All Posts

Take Stock of Cyber Risk in Light of Russian Cyber Activity

Many leaders in enterprise information security and IT operations organizations are taking stock of the potential for risk …

View

Scams for Scans: QR Codes See Surge in Popularity, As Well As Fraud

We ignored them for years, but it looks like the QR code may be here to stay. “QR” …

View

2022: Expect the unexpected as cyberattacks continue to target organizations

Headline-grabbing attacks such as Solarwinds, Kaseya, Colonial Pipeline, JBS Foods and the Log4j vulnerability kept infosec professionals on …

View

Threat Hunting AWS CloudTrail with Microsoft Sentinel: Part 4

Section 4: Detecting AWS Atomic Red Team Attacks By Sean Fernandez | Threat Researcher | Binary Defense In …

View

Advice for Defenders Responding to the log4j Vulnerability CVE-2021-44228

Binary Defense Security Operations, Engineering, and Threat Hunting analysts have been working alongside our clients and our friends …

View

Threat Hunting AWS CloudTrail with Sentinel: Part 3

Detecting Backdoor Attacks By Sean Fernandez | Threat Researcher | Binary Defense In part 3 of the blog …

View