Emerging deepfake technology could have security implications for businesses
Author: Kathy Jambor/Randy Pargman Tom Cruise made headlines recently, but not for a new Mission
Solutions
Watch the Video
How does Binary Defense help protect your organization? With best in breed cybersecurity tactics, techniques, and services, we make sure that your environment is secure against the most advanced attacks.
Resource Library
From the Blog
Author: Kathy Jambor/Randy Pargman Tom Cruise made headlines recently, but not for a new Mission
I’m really proud of our team! Binary Defense has been named a “Leader” in the
In August of 2019, US Representatives Jack Bergman and Andy Kim introduced a new bill
Featured Webinar
Come see how you can better detect threat actors using Cobalt Strike and other often
Outsmart your adversaries with daily views into the current threat landscape. The experts on our counterintelligence team analyze the latest cybersecurity news and offer insights that you can leverage to protect your business.
The software auditing tool provider Codecov recently disclosed a data breach. Now it’s being reported that an unknown number of their clients, possibly thousands, have …
Stay informed with cybersecurity news and analyst recommendations.
Researchers at Sopho’s have observed a sort of reboot to a classic, mostly theoretical, attack named Rowhammer. This attack involves repeatedly attack a specific address in memory enough to affect …
In response to the SolarWinds supply attack, the U.S. government issued sanctions against Russia. In the order, clear attribution was made, stating that teams in the Russian SVR were responsible …
The cryptocurrency rewards program platform Celsius network has disclosed a security breach that led to customer information being exposed. Celsius CEO Alex Mashinsky stated that a third-party marketing server was …
Non-Fungible Tokens (NFTs) have become extremely popular as of late and have been making people a lot of money. Quite simply, NFTs are digital comps or artwork and other original …
According to researchers at Avast Security, a new campaign has been targeting people who are looking for hacking tools on Telegram channels. The HackBoss cryptocurrency malware has been using fake …
To mitigate the damage from the rapid exploitation of the ProxyLogon vulnerabilities in Microsoft Exchange servers, the FBI conducted a court-approved operation to remove webshells left by one of the …
CVE-2021-20291 was discovered earlier this month by Aviv Sasson. This effort was part of a security audit surveying multiple Go libraries that Kubernetes relies on to function. This vulnerability lies …
While many threat actors attempted to take advantage of the recent ProxyLogon Exchange vulnerabilities to deploy ransomware, some went in another direction. A Sophos report released Tuesday details an attack …
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.