Binary Defense Blog

Read the latest cybersecurity news and insights from our industry experts

Featured Post

Featured

Detecting Ransomware’s Stealthy Boot Configuration Edits

Written By: Binary Defense Threat Researcher @shade_vx This blog post focuses on threat hunting …

Subscribe to the Blog

View All Posts

Mars-Deimos: From Jupiter to Mars and Back again (Part Two)

Note: this post was originally shared on https://squiblydoo.blog/ by a member of the Binary Defense Team. In order to ensure …

View

Mars-Deimos: SolarMarker/Jupyter Infostealer (Part 1)

Note: this post was originally shared on https://squiblydoo.blog/ by a member of the Binary Defense Team. In order …

View

Analysis of Hancitor – When Boring Begets Beacon

Author: Brandon George What is Hancitor? Hancitor is a well-known malware loader that has been observed delivering FickerStealer, …

View

Payment App Scammers: Stay Aware and Learn to Avoid Them

Keep Your Virtual Wallet Safe As technology rises, fewer people are carrying cash and are opting instead for …

View

Intruder Tactics: Privilege Escalation

What is privilege escalation? Privilege escalation is just a formal way of describing when an attacker gains more …

View

Ransomware group targeted DC police, then sent mixed messages about shutting down

In what is the 26th cyberattack on law enforcement since the beginning of 2021, the Washington D.C. Metro …

View