Binary Defense Blog

Read the latest cybersecurity news and insights from our industry experts

Featured Post

Featured

Detecting Ransomware’s Stealthy Boot Configuration Edits

Written By: Binary Defense Threat Researcher @shade_vx This blog post focuses on threat hunting …

Subscribe to the Blog

View All Posts

Dark Web Reactions to Russia’s Invasion of Ukraine

Tensions continue to escalate around the globe as the world watches Ukraine fight off a Russian invasion. Several …

View

Take Stock of Cyber Risk in Light of Russian Cyber Activity

Many leaders in enterprise information security and IT operations organizations are taking stock of the potential for risk …

View

Scams for Scans: QR Codes See Surge in Popularity, As Well As Fraud

We ignored them for years, but it looks like the QR code may be here to stay. “QR” …

View

2022: Expect the unexpected as cyberattacks continue to target organizations

Headline-grabbing attacks such as Solarwinds, Kaseya, Colonial Pipeline, JBS Foods and the Log4j vulnerability kept infosec professionals on …

View

Threat Hunting AWS CloudTrail with Microsoft Sentinel: Part 4

Section 4: Detecting AWS Atomic Red Team Attacks By Sean Fernandez | Threat Researcher | Binary Defense In …

View

Advice for Defenders Responding to the log4j Vulnerability CVE-2021-44228

Binary Defense Security Operations, Engineering, and Threat Hunting analysts have been working alongside our clients and our friends …

View