12 Essentials for a Successful SOC Partnership
As cyber threats continue to impact businesses of all sizes, the need for round-the-clock security
Solutions
Watch the Video
How does Binary Defense help protect your organization? With best in breed cybersecurity tactics, techniques, and services, we make sure that your environment is secure against the most advanced attacks.
Resource Library
From the Blog
As cyber threats continue to impact businesses of all sizes, the need for round-the-clock security
Written by: Nataliia Zdrok, Threat Intelligence Analyst at Binary Defense Russia’s invasion of Ukraine increased
By Anthony Zampino Introduction Leading up to the most recent Russian invasion of Ukraine in
Featured Webinar
Often an overlooked component of cybersecurity, digital risk protection services monitor web activity to protect
Outsmart your adversaries with daily views into the current threat landscape. The experts on our counterintelligence team analyze the latest cybersecurity news and offer insights that you can leverage to protect your business.
Various German airports, public administration bodies, and financial sector organizations were targeted in a widescale DDoS campaign. According to the Federal Cyber Security Authority (BSI), …
Stay informed with cybersecurity news and analyst recommendations.
According to researchers at SentinelLabs, a Chinese threat actor tracked as DragonSpark has been stealing sensitive data from compromised systems around East Asia. The main access vector for the threat …
Researchers stopped an “expansive” ad fraud campaign that spoofed over 1,700 applications from 120 publishers and impacted about 11 million devices. “VASTFLUX was a malvertising attack that injected malicious JavaScript …
The FanDuel sportsbook and betting site is warning customers that their names and email addresses were exposed in a January 2023 MailChimp security breach, urging users to remain vigilant against phishing emails. On …
A cyberattack at Qulliq Energy Corporation (QEC) in Canada’s Nunavut territory has left the company limited in its operations. The attack is believed to have begun on January 15th and …
A new Android malware named ‘Hook’ is being sold by cybercriminals, boasting it can remotely take over mobile devices in real-time using VNC (virtual network computing). The new malware is …
The wireless carrier T-Mobile has reported another data breach, this time affecting approximately 37 million customers. According to the disclosure the company filed with the SEC, the company believes a …
A new custom Windows and Linux malware dubbed “BOLDMOVE” was used to exploit a recently disclosed vulnerability in FortiOS SSL-VPN. The vulnerability was fixed in November and then disclosed by …
The Computer Emergency Response Team of Ukraine (CERT-UA) has linked a destructive malware attack targeting the country’s national news agency (Ukrinform) to Sandworm Russian military hackers. CERT-U says the cyberattack was likely …