Binary Defense Blog

Read the latest cybersecurity news and insights from our industry experts

Featured Post

Cybersecurity

Analysis of Hancitor – When Boring Begets Beacon

Author: Brandon George What is Hancitor? Hancitor is a well-known malware loader that has …

Subscribe to the Blog

View All Posts

What is the Darknet?

Author: Jarrod Suffecool We all hear about the “Darknet” and the “Deepweb” all the time when referring to …

View

Are you in tune? Why SIEM tuning is important

Authors: Eric Itangata and Mike Daniels A Security Information and Event Manager (SIEM) is in the traditional sense, …

View

EmoCrash: Exploiting a Vulnerability in Emotet Malware for Defense

By: James Quinn Most of the vulnerabilities and exploits that you read about are good news for attackers …

View

Creating YARA Rules Based on Code

Author: Stephan Simon The first post of this two-part blog covered a simple introduction to YARA, simple rules …

View

Hunting and Defeating Evasive Threats

Written by: Randy Pargman and James Quinn Threat actors spend a lot of time and energy to evade and defeat …

View

Russian Cybercriminal Group Attempts to Steal COVID-19 Vaccine Research

Last week, as reported in Threat Watch, the APT29 threat group, attributed to Russia’s intelligence service, was found …

View