Binary Defense Blog

Read the latest cybersecurity news and insights from our industry experts

Featured Post


Qakbot Upgrades to Stealthier Persistence Method

Qakbot is a versatile banking trojan that until recently, focused primarily on theft of …

Subscribe to the Blog

View All Posts

Creating YARA Rules Based on Code

Author: Stephan Simon The first post of this two-part blog covered a simple introduction to YARA, simple rules …


Hunting and Defeating Evasive Threats

Written by: Randy Pargman and James Quinn Threat actors spend a lot of time and energy to evade and defeat …


Russian Cybercriminal Group Attempts to Steal COVID-19 Vaccine Research

Last week, as reported in Threat Watch, the APT29 threat group, attributed to Russia’s intelligence service, was found …


Hackers for Hire: An Overview of the Unethical Services Offered on the Darknet

By: Dan McNemar It is not a new concept that criminals use the Darknet to buy and sell …


Intro to Threat Hunting

If you’ve been around the information security community, you’ve probably heard the term “Threat Hunting” and considered how …


What is YARA? Get to know this malware research tool

Written By: Stephan Simon The official GitHub repository for YARA describes it as “a tool aimed at (but …


Contact Support

Please complete the form below and a member of our support team will respond as quickly as possible.