Binary Defense Blog

Read the latest cybersecurity news and insights from our industry experts

Featured Post

Featured

Qakbot Upgrades to Stealthier Persistence Method

Qakbot is a versatile banking trojan that until recently, focused primarily on theft of …

Subscribe to the Blog

View All Posts

Creating YARA Rules Based on Code

Author: Stephan Simon The first post of this two-part blog covered a simple introduction to YARA, simple rules …

View

Hunting and Defeating Evasive Threats

Written by: Randy Pargman and James Quinn Threat actors spend a lot of time and energy to evade and defeat …

View

Russian Cybercriminal Group Attempts to Steal COVID-19 Vaccine Research

Last week, as reported in Threat Watch, the APT29 threat group, attributed to Russia’s intelligence service, was found …

View

Hackers for Hire: An Overview of the Unethical Services Offered on the Darknet

By: Dan McNemar It is not a new concept that criminals use the Darknet to buy and sell …

View

Intro to Threat Hunting

If you’ve been around the information security community, you’ve probably heard the term “Threat Hunting” and considered how …

View

What is YARA? Get to know this malware research tool

Written By: Stephan Simon The official GitHub repository for YARA describes it as “a tool aimed at (but …

View

Contact Support

Please complete the form below and a member of our support team will respond as quickly as possible.