12 Essentials for a Successful SOC Partnership
As cyber threats continue to impact businesses of all sizes, the need for round-the-clock security
Solutions
Watch the Video
How does Binary Defense help protect your organization? With best in breed cybersecurity tactics, techniques, and services, we make sure that your environment is secure against the most advanced attacks.
Resource Library
From the Blog
As cyber threats continue to impact businesses of all sizes, the need for round-the-clock security
Written by: Nataliia Zdrok, Threat Intelligence Analyst at Binary Defense Russia’s invasion of Ukraine increased
By Anthony Zampino Introduction Leading up to the most recent Russian invasion of Ukraine in
Featured Webinar
March 29, 2 PM Eastern For many organizations, Security Operations Center Analysts are the first
Outsmart your adversaries with daily views into the current threat landscape. The experts on our counterintelligence team analyze the latest cybersecurity news and offer insights that you can leverage to protect your business.
ScarCruft, a North Korean-based threat actor group, has been seen using weaponized Microsoft Compiled HTML Help files to download additional malware on infected machines. The …
Stay informed with cybersecurity news and analyst recommendations.
Hamas has attempted yet again to target Israeli citizens through cyber-attacks. Hackers tied to Hamas created a fake rocket notification app designed to target Israeli citizens. The app mimics the …
Researchers have discovered a number of vulnerabilities in mPOS (mobile point-of-sale) devices which affect Square, PayPal, SumUp and, and iZettle. The vulnerabilities reside in the endpoint payment systems and allow …
The popular cellphone maker, Samsung, suffered from a microchip security flaw in their Galaxy S7 Smartphones which could potentially pose a high risk for anyone using the cellphone model. Until …
North Korean hackers have been discovered reusing malware and computer infrastructure. The examination of North Korean malware discovered that the same code is often reused in multiple attacks. It was …
On Wednesday, the ISC (Internet Systems Consortium) discovered a vulnerability in the BIND DNS software that can be exploited for DoS (Denial of Service) attacks. The vulnerability (CVE-2018-5740) can be …
Two years ago, cyber-security scams pertaining to real estate was a $19 million-dollar racket, and in a little over a year, grew to $1 Billion. It is common knowledge that …
As tensions between the U.S. and Iran continue to grow so do fears of an Iranian cyber-attack. Sanctions are expected to be re-imposed this week which has many on edge. …
DeepLocker is an AI (Artificial Intelligence) highly targeted and evasive malware. The malware is dormant until it finds a specific target which is determined through multiple factors such as geolocation, …