Binary Defense Blog

Read the latest cybersecurity news and insights from our industry experts

Featured Post

Featured

Detecting Ransomware’s Stealthy Boot Configuration Edits

Written By: Binary Defense Threat Researcher @shade_vx This blog post focuses on threat hunting …

Subscribe to the Blog

View All Posts

Solarmarker: By Any Other Name (Mars-Deimos part 3)

Note: this post was originally shared on https://squiblydoo.blog/ by a member of the Binary Defense Team. In order to ensure …

View

Getting the Board on Board with Cybersecurity

With a heightened focus on keeping businesses safe from cyberattacks, particularly due to high-profile ransomware and third-party vendor …

View

Mimicking Human Activity using Selenium and Python

Intro The Binary Defense threat hunting team are experts on today’s threat actor groups. In addition to monitoring …

View

Commodity vs Behavioral Detections

This content was originally presented as a webinar. This blog post will highlight some of the key points. …

View

Mars-Deimos: From Jupiter to Mars and Back again (Part Two)

Note: this post was originally shared on https://squiblydoo.blog/ by a member of the Binary Defense Team. In order to ensure …

View

Mars-Deimos: SolarMarker/Jupyter Infostealer (Part 1)

Note: this post was originally shared on https://squiblydoo.blog/ by a member of the Binary Defense Team. In order …

View