Binary Defense Blog

Read the latest cybersecurity news and insights from our industry experts

Featured Post

Featured

Detecting Ransomware’s Stealthy Boot Configuration Edits

Written By: Binary Defense Threat Researcher @shade_vx This blog post focuses on threat hunting …

Subscribe to the Blog

View All Posts

Threat Hunting AWS CloudTrail with Sentinel: Part 2

Detecting S3 Bucket Attack   By Sean Fernandez | Threat Researcher | Binary Defense   In part 2 of the blog series, Threat Hunting AWS CloudTrail with Sentinel, …

View

Threat Hunting AWS CloudTrail with Sentinel: Part 1

Part 1: Intro to Threat Hunting AWS CloudTrail with Sentinel By Sean Fernandez | Threat Researcher | Binary …

View

The Inside Scoop: Binary Defense Employees’ Advice to Cybersecurity Newbs

To wrap up this year’s Cybersecurity Awareness Month, we asked a handful of our employees for advice they …

View

Solarmarker: By Any Other Name (Mars-Deimos part 3)

Note: this post was originally shared on https://squiblydoo.blog/ by a member of the Binary Defense Team. In order to ensure …

View

Getting the Board on Board with Cybersecurity

With a heightened focus on keeping businesses safe from cyberattacks, particularly due to high-profile ransomware and third-party vendor …

View

Mimicking Human Activity using Selenium and Python

Intro The Binary Defense threat hunting team are experts on today’s threat actor groups. In addition to monitoring …

View