Latest Threat Research: LetMeowIn – Analysis of a Credential Dumper

Get Informed

Search

Binary Defense Blog

Read the latest news and insights from our industry experts.

Subscribe to our Newsletter

Featured Post

Wineloader – Analysis of the Infection Chain

By ARC Labs contributor, Shannon Mong ARC Labs recently analyzed a sample of the Wineloader backdoor for infection chain analysis and detection opportunities to help defenders…

Read More

View All Posts

Cybersecurity Moneyball Part 1: Managed Deception for Easy Outs 

Read More

Wineloader – Analysis of the Infection Chain

Read More

LetMeowIn – Analysis of a Credential Dumper

Read More

Communication is Key – Leveraging Business Frameworks to Develop a Detection and Response Strategy 

Read More

Diving into Hidden Scheduled Tasks 

Read More

Sisense Data Compromise: ARC Labs Intelligence Flash

Read More

Analyzing CryptoJS Encrypted Phishing Attempt 

Read More

Qakbot Strikes Back: Understanding the Threat 

Read More

MalSync Teardown: From DLL Hijacking to PHP Malware for Windows  

Read More

MDR Metrics that Matter – From Analysts to the Board of Directors 

Read More

Incident Response – IR Planning & MDR Coordination  

Read More

The Role of Deception Technology in Modern Cybersecurity

Read More