
Demystifying DLL Hijacking Understanding the Intricate World of Dynamic Link Library Attacks
By: Jonny Johnson, Senior Researcher of Adversarial Techniques and Capabilities at Binary Defense
Introduction
DLL Hijack-based attacks have been...

The Client/Server Relationship — A Match Made In Heaven
This blog is written by Jonny Johnson, Senior Researcher of Adversarial Techniques and Capabilities at Binary Defense, and co-authored with Charlie Clark ...

ThreadSleeper: Suspending Threads via GMER64 Driver
Recently a friend of mine, Nick Powers, sent me the gmer.sys driver that was...

Customer Perspectives: Binary Defense MDR not only enhances security professionals' lives but unlocks ROI benefits
Security professionals are facing an ever-increasing number of sophisticated cyber threats. Safeguarding organizational assets and data has become a chall...

Unveiling Hidden Intel: Why Leveraging Phishing Emails for Intelligence is Essential
The evolution of threats is constant in today's digital landscape. Organizations need to harness the data they have to garner insights to better combat em...

12 Essentials for a Successful SOC Partnership
As cyber threats continue to impact businesses of all sizes, the need for round-the-clock security monitoring also grows. Being able to detect and respond...

Cyber War: Hackers' Transformation from Cyber Criminals to Hacktivists
Russia’s invasion of Ukraine increased malicious cyber activity among hacktivists. Several criminal hacking groups supportive of Putin’s regime have t...

The war in Ukraine and its impact on how China views Taiwan
Leading up to the most recent Russian invasion of Ukraine in February 2022, analysts and military experts alike feared a superior Russian army would overw...

Digging through Rust to find Gold: Extracting Secrets from Rust Malware
Threat actors have begun migrating from older and well-known compiled languages such as C/C++ to more modern languages. These newer compiled languages inc...

5 Critical Criteria for evaluating Managed Detection & Response (MDR)
When evaluating a Managed Detection & Response (MDR) service there are 5 critical components that you should focus on.
Selecting a Managed ...
