War in Ukraine and Its Impact on Hackers
The Russian invasion of Ukraine started on February 24th, and no one was left indifferent.
Solutions
Watch the Video
How does Binary Defense help protect your organization? With best in breed cybersecurity tactics, techniques, and services, we make sure that your environment is secure against the most advanced attacks.
Resource Library
From the Blog
The Russian invasion of Ukraine started on February 24th, and no one was left indifferent.
Written By: Binary Defense Threat Researcher @shade_vx This blog post focuses on threat hunting methods
Written By: Kim McAloon Hunting for Password Files on Endpoints As part of the Okta compromise,
Featured Webinar
Whenever new malware shows up, threat hunters and network defenders should be asking themselves: “Would
Outsmart your adversaries with daily views into the current threat landscape. The experts on our counterintelligence team analyze the latest cybersecurity news and offer insights that you can leverage to protect your business.
Security researchers have found a new collection of phishing domains offering up fake Windows 11 installers that deliver information-stealing malware. Cybersecurity firm Zscaler said that newly registered …
Stay informed with cybersecurity news and analyst recommendations.
Researchers from Microsoft Security Intelligence recently reported on continued use of the sqlps.exe Living Off the Land Binary (LOLBIN) technique in recent attacks. The use of sqlps.exe, installed by default …
According to researchers at Kaspersky, statistical data is showing that the use of HTML files within phishing emails is still very prominent. The company detected over two million emails with …
Exploitation of CVE-2021-25094, a remote code execution vulnerability in the popular Tatsu Builder plugin for WordPress, has seen a heavy increase in exploitation in the wild. A large wave of …
A criminal complaint was unsealed today charging Moises Luis Zagala Gonzalez (Zagala), also known as “Nosophoros,” “Aesculapius” and “Nebuchadnezzar,” a citizen of France and Venezuela who resides in Venezuela, with …
Researchers say that geopolitical tension, ransomware, and cyberattacks using stolen credentials threaten the UK’s financial sector. On Monday, KELA’s security team published a report examining the cybersecurity issues and attacks …
The European Union (EU) has taken preliminary steps to protect both public and private organizations from cyber-attacks. The new directive, called “NIS2” (short for network and information systems), updates previous …
Researchers from the Secure Mobile Networking Lab at the Technical University of Darmstadt have created a Proof of Concept (POC) attack for loading malware onto the Bluetooth chip of an …
On May 8th, researchers at KrebsOnSecurity discovered that hackers may have gained unauthorized access to a US Drug Enforcement Agency (DEA) portal that taps into 16 different federal law enforcement …