Binary Defense Blog

Read the latest cybersecurity news and insights from our industry experts

Featured Post

Counterintelligence

Intro to Threat Hunting

If you’ve been around the information security community, you’ve probably heard the term “Threat …

Subscribe to the Blog

View All Posts

The Downfall of a Cyber-Criminal: “W0zniak”

Executive Summary Binary Defense regularly monitors Darknet sites, criminal forums and other sources to find threats that may …

View

Emotet Evolves With new Wi-Fi Spreader

Emotet is a highly sophisticated trojan that typically also serves as a loader for other malware. A key …

View

An Updated ServHelper Tunnel Variant

James Quinn, Threat Researcher for Binary Defense Executive Summary Binary Defense Researchers discovered active Command and Control (C2) …

View

Disney+ Account Passwords Found on Dark Web: Prevent Your Account from Being Sold

As reported by ZDNet, Fox News and other news sources this week, a large number of usernames and …

View

Revenge is a Dish Best Served… Obfuscated?

Researching new and emerging cyber threats is common practice for the Binary Defense Threat Hunting team. Recently, the …

View

Binary Defense MDR Integrates Microsoft Antimalware Scan Interface Interoperability (AMSI)

With the latest release of the Binary Defense Managed Detection and Response (MDR) solution, we have now fully …

View

Contact Support

Please complete the form below and a member of our support team will respond as quickly as possible.