Binary Defense Blog

Read the latest cybersecurity news and insights from our industry experts

Featured Post

Featured

Detecting Ransomware’s Stealthy Boot Configuration Edits

Written By: Binary Defense Threat Researcher @shade_vx This blog post focuses on threat hunting …

Subscribe to the Blog

View All Posts

Detecting Follina Exploits Using a Remote Answer File 

By: Matt Ehrnschwender (@M_alphaaa)  A vulnerability in the Microsoft Support Diagnostic Tool (MSDT), dubbed “Follina” (CVE-2022-30190) has been …

View

4 Tactics to Detect & Contain Emotet’s Latest Evolution 

Emotet’s latest evolution is bypassing old detection techniques.   In Mid-April, the Emotet botnet significantly increased its volume …

View

War in Ukraine and Its Impact on Hackers

The Russian invasion of Ukraine started on February 24th, and no one was left indifferent. Cybercriminals are divided …

View

Breaking Down Password Storage Breakdowns

Written By: Kim McAloon Hunting for Password Files on Endpoints As part of the Okta compromise, it was announced …

View

Dark Web Reactions to Russia’s Invasion of Ukraine

Tensions continue to escalate around the globe as the world watches Ukraine fight off a Russian invasion. Several …

View

Take Stock of Cyber Risk in Light of Russian Cyber Activity

Many leaders in enterprise information security and IT operations organizations are taking stock of the potential for risk …

View