Binary Defense Blog

Read the latest cybersecurity news and insights from our industry experts

Featured Post

Featured

Detecting Ransomware’s Stealthy Boot Configuration Edits

Written By: Binary Defense Threat Researcher @shade_vx This blog post focuses on threat hunting …

Subscribe to the Blog

View All Posts

Threat Hunting AWS CloudTrail with Microsoft Sentinel: Part 4

Section 4: Detecting AWS Atomic Red Team Attacks By Sean Fernandez | Threat Researcher | Binary Defense In …

View

Advice for Defenders Responding to the log4j Vulnerability CVE-2021-44228

Binary Defense Security Operations, Engineering, and Threat Hunting analysts have been working alongside our clients and our friends …

View

Threat Hunting AWS CloudTrail with Sentinel: Part 3

Detecting Backdoor Attacks By Sean Fernandez | Threat Researcher | Binary Defense In part 3 of the blog …

View

Threat Hunting AWS CloudTrail with Sentinel: Part 2

Detecting S3 Bucket Attack   By Sean Fernandez | Threat Researcher | Binary Defense   In part 2 of the blog series, Threat Hunting AWS CloudTrail with Sentinel, …

View

Threat Hunting AWS CloudTrail with Sentinel: Part 1

Part 1: Intro to Threat Hunting AWS CloudTrail with Sentinel By Sean Fernandez | Threat Researcher | Binary …

View

The Inside Scoop: Binary Defense Employees’ Advice to Cybersecurity Newbs

To wrap up this year’s Cybersecurity Awareness Month, we asked a handful of our employees for advice they …

View