Binary Defense Blog

Read the latest cybersecurity news and insights from our industry experts

Featured Post


Detecting Ransomware’s Stealthy Boot Configuration Edits

Written By: Binary Defense Threat Researcher @shade_vx This blog post focuses on threat hunting …

Subscribe to the Blog

View All Posts

Mimicking Human Activity using Selenium and Python

Intro The Binary Defense threat hunting team are experts on today’s threat actor groups. In addition to monitoring …


Commodity vs Behavioral Detections

This content was originally presented as a webinar. This blog post will highlight some of the key points. …


Mars-Deimos: From Jupiter to Mars and Back again (Part Two)

Note: this post was originally shared on by a member of the Binary Defense Team. In order to ensure …


Mars-Deimos: SolarMarker/Jupyter Infostealer (Part 1)

Note: this post was originally shared on by a member of the Binary Defense Team. In order …


Analysis of Hancitor – When Boring Begets Beacon

Author: Brandon George What is Hancitor? Hancitor is a well-known malware loader that has been observed delivering FickerStealer, …


Payment App Scammers: Stay Aware and Learn to Avoid Them

Keep Your Virtual Wallet Safe As technology rises, fewer people are carrying cash and are opting instead for …