Break down the business value of Binary Defense services into dollars and cents

Binary Defense Blog

Read the latest cybersecurity news and insights from our industry experts

Featured Post


Analysis of Hancitor – When Boring Begets Beacon

Author: Brandon George What is Hancitor? Hancitor is a well-known malware loader that has …

Subscribe to the Blog

View All Posts

Commodity vs Behavioral Detections

This content was originally presented as a webinar. This blog post will highlight some of the key points. …


Mars-Deimos: From Jupiter to Mars and Back again (Part Two)

Note: this post was originally shared on by a member of the Binary Defense Team. In order to ensure …


Mars-Deimos: SolarMarker/Jupyter Infostealer (Part 1)

Note: this post was originally shared on by a member of the Binary Defense Team. In order …


Payment App Scammers: Stay Aware and Learn to Avoid Them

Keep Your Virtual Wallet Safe As technology rises, fewer people are carrying cash and are opting instead for …


Intruder Tactics: Privilege Escalation

What is privilege escalation? Privilege escalation is just a formal way of describing when an attacker gains more …


Ransomware group targeted DC police, then sent mixed messages about shutting down

In what is the 26th cyberattack on law enforcement since the beginning of 2021, the Washington D.C. Metro …