Latest Threat Research: LetMeowIn – Analysis of a Credential Dumper

Get Informed

Search

Binary Defense Blog

Read the latest news and insights from our industry experts.

Subscribe to our Newsletter

View All Posts

Beyond Alerting: Finding Hidden Threats 

Read More

Running Malware Below the OS – The State of UEFI Firmware Exploitation

Read More

The Role of AI/ML in Security Operations

Read More

Beyond Alerting: The Need for Behavior-Based Detection Strategy

Read More

Uncovering Adversarial LDAP Tradecraft

Read More

Mastering Windows Access Control: Understanding SeDebugPrivilege

Read More

Demystifying DLL Hijacking Understanding the Intricate World of Dynamic Link Library Attacks

Read More

The Client/Server Relationship — A Match Made In Heaven 

Read More

ThreadSleeper: Suspending Threads via GMER64 Driver 

Read More

Customer Perspectives: Binary Defense MDR not only enhances security professionals’ lives but unlocks ROI benefits 

Read More

Unveiling Hidden Intel: Why Leveraging Phishing Emails for Intelligence is Essential

Read More

Detecting Follina Exploits Using a Remote Answer File 

Read More