Mobility Device copy

Binary Defense Software Developer Uses Programming Expertise to Help Injured Veteran Regain Mobility

Many Binary Defense employees are involved in their communities, using their skills to give back or to educate their neighbors about cybersecurity. Binary Defense Senior Python Developer Ilya Gotfryd recently gave his time to a very worthy cause. In conjunction with a group called Challenge America, Ilya and a team of volunteers helped develop a […]
Gh0stCringe Malware communicating its login packet to my server

Gh0stCringe (Formerly CirenegRAT)

Since early December, 2018, I’ve been seeing a new type of Gh0stRAT-like malware being distributed over SMB.  This sample has been dubbed Gh0stCringe by @James_InThe_Box on twitter.  While the network communications of this new malware is very similar to that of Gh0stRAT, there are some key differences: Instead of the use of Zlib compression on […]
Binary Defense

Binary Defense surges amid awareness, product launch

Credit: Crain’s Cleveland Business Crain’s Cleveland Business recently published an article on the growth of Binary Defense. Binary Defense CEO, Mike Valentine, explains how hackers are using different methods of attacks. “Today’s savvy malware perpetrators offer customer-support lines to help their victims figure out how to buy cryptocurrency, like bitcoin, to pay the ransom. They […]
credential stuffing

Credential Stuffing…A Side Effect of Data Breaches

Credential stuffing is a type of brute force cyberattack which uses automation in an effort to gain unauthorized access to systems around the world…and it all starts with a simple data breach. Data from One Breach Poses Risks to Additional Systems An alarming number (almost half) of people use the same or similar password across […]
binarydefense protect yourself

Protect Yourself from Password Spraying Attacks

Password spraying attacks are just one method hackers use to gain unauthorized access to systems around the world. The technique itself is not complex, and a simple online search turns up instructions even cyber-novices can follow. While the attack is relatively simple and should be easy to defend against, it is effective, and it continues […]
AV partner 1

AT&T Cybersecurity Names Binary Defense Global Partner of the Year

Binary Defense™—a leading cybersecurity firm in Endpoint Detection and Response, SOC-as-a-Service and Counterintelligence—was named AT&T Cybersecurity’s (formerly AlienVault) 2018 Global Partner of the Year. Binary Defense had been named Global Partner of the Year in 2016 and returned to the top spot in 2018 by delivering 100% year-over-year growth. Binary Defense teams with AT&T Cybersecurity […]
Binary Defense office

Binary Defense Expands Security Operations Center in Stow, Ohio

Binary Defense™—a leading cybersecurity firm in Managed Endpoint Detection and Response (M-EDR) now with built-in Endpoint Platform Protection (EPP)—has opened a new state-of-the-art facility in Stow, OH. The new location at 600 Alpha Parkway will serve as the operations hub for the 5-year old cybersecurity company, benefiting Binary Defense customers by offering an expanded Security […]
Threat Intelligence Employees’ Private Data Compromised in Airbus Data Breach 1

Threat Intelligence: Employees’ Private Data Compromised in Airbus Data Breach

Aeronautical giant Airbus has recently discovered a breach in their system which led to unauthorized parties accessing employee information. The company assured that none of their commercial operations were affected. Information such as employee contact details and IT identification details were accessed. “Investigations are ongoing to understand if any specific data was targeted, however, we […]
Threat Intelligence blog

Threat Intelligence: Verity Healthcare Suffers Multiple Phishing Attacks

Verity Health System, a six medical clinic operation in Redwood City, California, has informed an undisclosed number of people that their information may have been accessed due to phishing. Through these phishing attempts, attackers were able to obtain three employee emails that had messages and attachments contained within them. Other emails included patient names, treatment […]
Threat Intelligence iOS Bug Gives Unauthorized Access to User’s FaceTime Audio and Video

Threat Intelligence: iOS Bug Gives Unauthorized Access to User’s FaceTime Audio and Video

A bug in Apple devices running iOS 12.1 or later could leave users open to eavesdropping through Facetime. When it was initially reported, audio was believed to be the only piece affected but now it is known to give access to the front camera as well. The bug begins to work when a user is […]