New Case Study: Threat Hunter finds renamed system utilities by file hash to uncover multiple attacks   

Read Case Study

Search

Binary Defense Blog

Read the latest news and insights from our industry experts.

Subscribe to our Newsletter

Featured Posts

12 Essentials for a Successful SOC Partnership

As cyber threats continue to impact businesses of all sizes, the need for round-the-clock security monitoring also grows. Being able to detect and respond…

Read More

View All Posts

Unveiling Hidden Intel: Why Leveraging Phishing Emails for Intelligence is Essential

Read More

12 Essentials for a Successful SOC Partnership

Read More

Cyber War: Hackers’ Transformation from Cyber Criminals to Hacktivists

Read More

The war in Ukraine and its impact on how China views Taiwan

Read More

Digging through Rust to find Gold: Extracting Secrets from Rust Malware

Read More

5 Critical Criteria for evaluating Managed Detection & Response (MDR)

Read More

Using Microsoft Sentinel to Detect Confluence CVE-2022-26134 Exploitation  

Read More

Russia may be Pressing Arrested Cyber Criminals into Service

Read More

Get To Know Bob Meindl, Our New CEO! 

Read More

4 Tactics to Detect & Contain Emotet’s Latest Evolution 

Read More

War in Ukraine and Its Impact on Hackers

Read More

Detecting Ransomware’s Stealthy Boot Configuration Edits

Read More