Binary Defense Blog

Read the latest cybersecurity news and insights from our industry experts

Featured Post


Detecting Ransomware’s Stealthy Boot Configuration Edits

Written By: Binary Defense Threat Researcher @shade_vx This blog post focuses on threat hunting …

Subscribe to the Blog

View All Posts

Threat Hunting AWS CloudTrail with Sentinel: Part 2

Detecting S3 Bucket Attack   By Sean Fernandez | Threat Researcher | Binary Defense   In part 2 of the blog series, Threat Hunting AWS CloudTrail with Sentinel, …


Threat Hunting AWS CloudTrail with Sentinel: Part 1

Part 1: Intro to Threat Hunting AWS CloudTrail with Sentinel By Sean Fernandez | Threat Researcher | Binary …


The Inside Scoop: Binary Defense Employees’ Advice to Cybersecurity Newbs

To wrap up this year’s Cybersecurity Awareness Month, we asked a handful of our employees for advice they …


Solarmarker: By Any Other Name (Mars-Deimos part 3)

Note: this post was originally shared on by a member of the Binary Defense Team. In order to ensure …


Getting the Board on Board with Cybersecurity

With a heightened focus on keeping businesses safe from cyberattacks, particularly due to high-profile ransomware and third-party vendor …


Mimicking Human Activity using Selenium and Python

Intro The Binary Defense threat hunting team are experts on today’s threat actor groups. In addition to monitoring …