Binary Defense Blog

Read the latest cybersecurity news and insights from our industry experts

Featured Post

Featured

Detecting Ransomware’s Stealthy Boot Configuration Edits

Written By: Binary Defense Threat Researcher @shade_vx This blog post focuses on threat hunting …

Subscribe to the Blog

View All Posts

Russia may be Pressing Arrested Cyber Criminals into Service

Since early 2022, events have been changing dramatically in cyberspace. We can divide these events into before and …

View

Get To Know Bob Meindl, Our New CEO! 

In May of this year, we announced that well-known cybersecurity expert, Bob Meindl, joined Binary Defense as the …

View

Detecting Follina Exploits Using a Remote Answer File 

By: Matt Ehrnschwender (@M_alphaaa)  A vulnerability in the Microsoft Support Diagnostic Tool (MSDT), dubbed “Follina” (CVE-2022-30190) has been …

View

4 Tactics to Detect & Contain Emotet’s Latest Evolution 

Emotet’s latest evolution is bypassing old detection techniques.   In Mid-April, the Emotet botnet significantly increased its volume …

View

War in Ukraine and Its Impact on Hackers

The Russian invasion of Ukraine started on February 24th, and no one was left indifferent. Cybercriminals are divided …

View

Breaking Down Password Storage Breakdowns

Written By: Kim McAloon Hunting for Password Files on Endpoints As part of the Okta compromise, it was announced …

View