12 Essentials for a Successful SOC Partnership
As cyber threats continue to impact businesses of all sizes, the need for round-the-clock security
Solutions
Watch the Video
How does Binary Defense help protect your organization? With best in breed cybersecurity tactics, techniques, and services, we make sure that your environment is secure against the most advanced attacks.
Resource Library
From the Blog
As cyber threats continue to impact businesses of all sizes, the need for round-the-clock security
Written by: Nataliia Zdrok, Threat Intelligence Analyst at Binary Defense Russia’s invasion of Ukraine increased
By Anthony Zampino Introduction Leading up to the most recent Russian invasion of Ukraine in
Featured Webinar
February 22, 2023 at 2pm Eastern Password managers continue to gain popularity by centralizing and
Outsmart your adversaries with daily views into the current threat landscape. The experts on our counterintelligence team analyze the latest cybersecurity news and offer insights that you can leverage to protect your business.
Security researchers at Deep Instinct have recently discovered multiple campaigns where Microsoft Visual Studio Tools for Office (VSTO) are being used as a method of …
Stay informed with cybersecurity news and analyst recommendations.
Security researchers at Deep Instinct have recently discovered multiple campaigns where Microsoft Visual Studio Tools for Office (VSTO) are being used as a method of achieving persistence and executing remote …
An ongoing Google ads malicious advertising campaign is spreading malware installers that leverage KoiVM virtualization technology to evade detection when installing the Formbook data stealer. KoiVM is a plugin for …
Threat actors have been spotted using the legitimate ClickFunnels service to bypass security services and redirect users to malicious links. ClickFunnels is an online service that helps entrepreneurs and small …
Newly discovered malware has been found in the wild exploiting vulnerable Redis servers to build a botnet that mines Monero cryptocurrency. The malware, dubbed HeadCrab, has been around since September …
A relatively new ransomware operation known as Nevada seems to be growing its capabilities quickly; security researchers have reported improved functionality for the locker targeting Windows and VMware ESXi systems. …
A security vulnerability has been found in Cisco gear used in various industries worldwide. In total, there are two bugs believed to be causing issues and affecting products such as …
A new exploit developed by security researchers from the Mercury Workshop Team allows users to unenroll an enterprise-managed Chromebook device. When one of these devices is enrolled with an enterprise, …
The development team at KeePass is contesting what is being referred to as a recently discovered weakness that enables attackers to covertly export the full password vault in plain text. …