Binary Defense Blog

Read the latest cybersecurity news and insights from our industry experts

Featured Post

Featured

Detecting Ransomware’s Stealthy Boot Configuration Edits

Written By: Binary Defense Threat Researcher @shade_vx This blog post focuses on threat hunting …

Subscribe to the Blog

View All Posts

Scams for Scans: QR Codes See Surge in Popularity, As Well As Fraud

We ignored them for years, but it looks like the QR code may be here to stay. “QR” …

View

2022: Expect the unexpected as cyberattacks continue to target organizations

Headline-grabbing attacks such as Solarwinds, Kaseya, Colonial Pipeline, JBS Foods and the Log4j vulnerability kept infosec professionals on …

View

Threat Hunting AWS CloudTrail with Microsoft Sentinel: Part 4

Section 4: Detecting AWS Atomic Red Team Attacks By Sean Fernandez | Threat Researcher | Binary Defense In …

View

Advice for Defenders Responding to the log4j Vulnerability CVE-2021-44228

Binary Defense Security Operations, Engineering, and Threat Hunting analysts have been working alongside our clients and our friends …

View

Threat Hunting AWS CloudTrail with Sentinel: Part 3

Detecting Backdoor Attacks By Sean Fernandez | Threat Researcher | Binary Defense In part 3 of the blog …

View

Threat Hunting AWS CloudTrail with Sentinel: Part 2

Detecting S3 Bucket Attack   By Sean Fernandez | Threat Researcher | Binary Defense   In part 2 of the blog series, Threat Hunting AWS CloudTrail with Sentinel, …

View