Binary Defense Blog

Read the latest cybersecurity news and insights from our industry experts

Featured Post

Cybersecurity

Analysis of Hancitor – When Boring Begets Beacon

Author: Brandon George What is Hancitor? Hancitor is a well-known malware loader that has …

Subscribe to the Blog

View All Posts

Threat Hunting AWS CloudTrail with Sentinel: Part 1

Part 1: Intro to Threat Hunting AWS CloudTrail with Sentinel By Sean Fernandez | Threat Researcher | Binary …

View

The Inside Scoop: Binary Defense Employees’ Advice to Cybersecurity Newbs

To wrap up this year’s Cybersecurity Awareness Month, we asked a handful of our employees for advice they …

View

Solarmarker: By Any Other Name (Mars-Deimos part 3)

Note: this post was originally shared on https://squiblydoo.blog/ by a member of the Binary Defense Team. In order to ensure …

View

Getting the Board on Board with Cybersecurity

With a heightened focus on keeping businesses safe from cyberattacks, particularly due to high-profile ransomware and third-party vendor …

View

Mimicking Human Activity using Selenium and Python

Intro The Binary Defense threat hunting team are experts on today’s threat actor groups. In addition to monitoring …

View

Commodity vs Behavioral Detections

This content was originally presented as a webinar. This blog post will highlight some of the key points. …

View