Latest Threat Research: LetMeowIn – Analysis of a Credential Dumper

Get Informed

Search

Resources

Discover cybersecurity education and training from our industry experts.

buyers guide 1

Binary Defense Buyer’s Guide

This Cybersecurity Buyer’s Guide will help you gain a deeper understanding of today’s threat landscape, along with insight into the top cybersecurity solutions offered by Binary Defense including SOC-as-a-Service, MDR, SIEM, Threat Hunting and Counterintelligence.

Stay Connected

Binary Defense Blog

Read the latest news and insights from our industry experts.

LetMeowIn – Analysis of a Credential Dumper

Engineered to evade top security products and stealthily harvest credentials from the LSASS process, LetMeowIn represents a significant challenge for cybersecurity defenders.

Read More

Communication is Key – Leveraging Business Frameworks to Develop a Detection and Response Strategy 

Read More

Diving into Hidden Scheduled Tasks 

Read More

Case Studies

See how we protect businesses just like yours.

Hospital Realizes Significant Time Savings After Partnering with Binary Defense Phishing Response Service

Challenges Phishing attacks continue to be a profitable and successful attack vector when targeting PHI or delivering ransomware to hospitals and health systems, with…

Read More

Retailer Restores Customer Trust Through Binary Defense Partnership

Read More

Global Biotechnology Giant Leverages Phishing Response Service to Thwart Phishing Attacks

Read More

Data Sheets & Infographics

Discover the features and benefits of our cybersecurity solutions.

Vision MDR Agent

With Binary Defense's Vision MDR Agent, you can harness decades of our detection engineering, threat intelligence, deception, and response capabilities to expand your detection…

Read More

Phishing Response

Read More

Incident Response

Read More

Threat Watch

Stay informed of cybersecurity news and events.

Nokoyawa Ransomware Attacks Leveraging Windows Zero Day

A report recently released by Kaspersky Labs has detailed a threat actor making use of a CLFS (Common Log File System) exploit to escalate…

Read More

Two Critical-Severity Vulnerabilities Patched in Latest Security Updates from SAP

Read More

Deluge of Fake Packages Cause DoS Attack on npm

Read More

Videos

Browse our video library to learn more about Binary Defense.

Binary Defense SIEM Services

We shield your business from cyberattacks with SIEM deployment, tuning and monitoring services that are customizable to your needs.

Read More

NCR Protects Global Network with SIEM Monitoring and Threat Hunting

Read More

Binary Defense Managed Detection & Response

Read More

White Papers

Dive deep into cybersecurity trends and tactics.

Binary Defense Key Economic Impact Report

Learn the value of Binary Defense managed security services to your organization with this Key Economic Impact Report. Binary Defense contracted with unbiased third-party…

Read More

Security Use Cases for Your SIEM

Read More

MDR – Advanced Threat Protection Beyond Antivirus

Read More

Webinars

Learn about the latest cybersecurity trends from industry experts.

The Scientific Approach to Threat Hunting 

LIVE WEBINAR: Thursday, May 23 at 1:00 PM ET You are constantly challenged by evolving threats that traditional security measures may not effectively detect…

Watch Now

Binary Defense ARC Labs

Watch Now

Deconstructing the Detection Query Conundrum

Watch Now