Using Microsoft Sentinel to Detect Confluence CVE-2022-26134 Exploitation
By Akshay Rohatgi and Randy Pargman About this Student Research Project Binary Defense’s mission is
Solutions
Watch the Video
How does Binary Defense help protect your organization? With best in breed cybersecurity tactics, techniques, and services, we make sure that your environment is secure against the most advanced attacks.
Resource Library
From the Blog
By Akshay Rohatgi and Randy Pargman About this Student Research Project Binary Defense’s mission is
Since early 2022, events have been changing dramatically in cyberspace. We can divide these events
In May of this year, we announced that well-known cybersecurity expert, Bob Meindl, joined Binary
Featured Webinar
Ransomware continues to be a problem for security teams across all industries, with 37% of
Outsmart your adversaries with daily views into the current threat landscape. The experts on our counterintelligence team analyze the latest cybersecurity news and offer insights that you can leverage to protect your business.
Researchers at Trillex discovered an unauthenticated Remote Code Execution (RCE) vulnerability in 29 router models made by DrayTek. The vulnerability, tracked as CVE-2022-32548, carries a …
Stay informed with cybersecurity news and analyst recommendations.
Unknown hackers have breached MyEtherWallet around the same time as the Bancor breach. The attack on MyEtherWallet (MEW) was carried out using a fraudulent version of the popular Hola VPN. …
A customer of the Florida fast food chicken restaurant, PDQ, has filed a class action lawsuit against the chain of 70 restaurants across 11 states on behalf of the customers …
A new BankBot campaign has surfaced in the wild dubbed Anubis and is targeting Turkish mobile users. Anubis has infiltrated the Google Play Store with at least 10 apps. The …
Unrest in the Kashmir region has been on the rise since the governor declared Governor’s Rule on June 20th. Anti-Indian sentiment has been on the rise and every counter-terror operation …
It has been recently seen that an attacker has successfully stole confidential military maintenance manuals for drones and tanks. The attacker exploited an FTP flaw in a Netgear router located …
Apple’s new iOS update 11.4.1 has a new USB Restricted Mode designed to prevent hackers and even law enforcement officials from using iPhone-cracking tools to crack iPhones via the Lightening …