Latest News: Binary Defense Named a Strong Performer by Leading Independent Research Firm

Access Report

Search

The Rise in EDR Killers: An Emerging Threat to Endpoint Security 

UPCOMING WEBINAR - MARCH 28 @ 2 PM ET

ThreatTalk Series

The growing prevalence of EDR attacks has left organizations grappling with the destructive impact of threat actors infiltrating their systems. These attacks are frequently executed using tools known as EDR Killers, which are designed to disable and disrupt endpoint detection and response solutions. These tools are purpose-built to undermine traditional endpoint security systems, leaving organizations vulnerable to undetected threats and data breaches. When organizations fail to implement a robust defense-in-depth strategy with comprehensive security solutions, attackers take advantage by targeting their single point of failure—EDR solutions.

Join us for an exclusive ThreatTalk where we’ll unpack the rise of EDR bypass methods, examine real-world examples such as the “Killer Ultra” campaign, and provide actionable insights to strengthen your organization’s endpoint defenses. From preventing over-reliance on EDR tools as a single defense layer to leveraging proactive monitoring, deception techniques, and layered security controls, this session will equip you with the tools to defend against these advanced threats. 

Our Threat Intelligence and Research team will be covering: 

  • Understanding EDR Killers
  • Why EDR Killers Pose a Growing and Serious Threat 
  • Unveiling EDR Killers on the Dark Web 
  • Prominent APT Groups Exploiting EDR Killers
  • Real-World Case Studies
  • Defense Strategies Against EDR Bypass
  • Live Open Discussion Session   

What is a ThreatTalk?

Powered by ARC Labs, ThreatTalks is a webinar series crafted to drive engagement and provide timely and relevant intelligence on the state of the threat landscape. Led by our seasoned experts, each session dives into our latest threat intelligence trends and effective threat-hunting strategies. 

About The Speakers

John Dwyer

John Dwyer

John Dwyer is the Director of Security Research and Head of ARC Labs at Binary Defense where he lead research and development initiatives to improve Binary Defense product and services as well as threat research to develop meaningful insights and trends for the security community. John (@_dwyer_ ) brings 15+ years of security and technology experience, with an extensive background in security research and development, incident response, threat hunting, security thought leadership, and adversary operational analysis. Prior to Binary Defense, John spent time with IBM X-Force, MIT Lincoln Laboratory, as well as Carnegie Mellon’s Software Engineering Institute as a research and incident responder. John has spoken at the world’s largest cybersecurity events such as Black Hat, RSAC, and SANS Threat Hunting Summit.

JP Castellanos

JP Castellanos

JP Castellanos, the Director of Threat Intelligence at Binary Defense, brings over 15 years of extensive experience in the cybersecurity domain. Beginning his career as a help desk analyst in the Department of Defense (DoD), JP has skillfully climbed the ranks through roles in Incident Response (IR), Security Operations Center (SOC) management, Threat Hunting, and Cyber Threat Intelligence. His tenure with the DoD lasted till 2018, after which he served as a Senior Threat Intelligence Analyst supporting a major oil and gas organization until 2023.

An expert in advanced threat detection and response, JP holds several prestigious certifications from SANS, including FOR578 Cyber Threat Intelligence Analyst, FOR572 Network Forensic Analyst, and SEC599 Defending Advanced Threats. These credentials underscore his expertise in anticipating, mitigating, and defending against advanced cyber threats.

Known for his ability to translate complex threat landscapes into actionable intelligence, JP is committed to fortifying organizations against the evolving challenges of cybersecurity. His unique blend of technical expertise and strategic foresight ensures that attendees gain valuable insights into the detection and prevention of sophisticated cyber threats.