News
Entertainment
Science & Technology
Life
Culture & Art
Hobbies
News
Entertainment
Science & Technology
Culture & Art
Hobbies
Discover how Binary Defense Dedicated Resources go beyond traditional staff augmentation. This blog breaks down the key differences that set our approach apart, offering more than just extra hands to enhance your cybersecurity efforts.
Discover how Binary Defense is revolutionizing malware detection with innovative, patent-pending technology that targets fundamental malware processes, ensuring future-resistant and efficient detection methods without relying on signature-based approaches. Learn about the shift in detection strategies and how it impacts the cybersecurity landscape.
Threat Hunting should be considered a foundational component of a security strategy which can be a significant driver in an organization’s security maturity and assist in making threat informed decisions about the future.
ARC Labs recently recovered a tool leveraged in Qilin ransomware attacks aimed at impairing defenses by disabling popular endpoint detection and response (EDR) and antivirus (AV) tools. ARC Labs has labeled this malware as "Killer Ultra" based on a module name within the malware.
Explanation of boot process of modern UEFI machines, as well as some of its built-in protections, and we will explore the techniques used by various real-world bootkits to circumvent these protections and hijack the boot process.
A Write-Up by TrustedSec’s Research Lead Carlos Perez and Binary Defense’s Research Lead Jonathan Johnson Introduction While it is important to discover new tradecraft, it is equally important to explore well-established and widely used techniques. The Binary Defense research team collaborated with the TrustedSec research team to dive into adversarial Lightweight Directory Access Protocol (LDAP) […]
[ By: Jonny Johnson, Senior Researcher of Adversarial Techniques and Capabilities at Binary Defense Introduction DLL Hijack-based attacks have been popular within the offensive community for several years. This technique has been used to achieve initial access, persistence, or privilege escalation in several environments. Due to the volume of DLL loads that happen in an […]
This blog post was co-authored with Charlie Clark and Andrew Schwartz from TrustedSec 1 Introduction One thing often forgotten is that detection engineering isn’t always centered around 1 action to 1 query but also to drive effective incident response to optimize the triage of an alert. This is best served with context. We often say, […]
Author: Jonny Johnson (@jsecurity101) Recently a friend of mine, Nick Powers, sent me the gmer.sys driver that was involved with the Blackout activity and exposed functionality to terminate any process you wanted from a medium integrity level context. This was being used against many EDR vendors, including Microsoft Defender for Endpoint, to kill their service […]
Security professionals are facing an ever-increasing number of sophisticated cyber threats. Safeguarding organizational assets and data has become a challenging endeavor, demanding robust solutions that not only detect and respond to threats effectively but also provide measurable return on investment (ROI). Binary Defense MDR (Managed Detection and Response) emerges as a game-changing solution, offering a […]
A vulnerability in the Microsoft Support Diagnostic Tool (MSDT), dubbed “Follina” (CVE-2022-30190) has been under active exploitation by threat actors for several months. The attack technique that delivers malware via Microsoft Word files first became widely known at the end of May 2022. Proof-of-Concept code, allowing generation of malicious files became widely available during this […]
Introduction The evolution of threats is constant in today’s digital landscape. Organizations need to harness the data they have to garner insights to better combat emerging threats and risks. To accomplish this, there’s a powerful asset hiding in plain sight: phishing emails. In this blog post, we’ll uncover the importance of leveraging phishing emails for […]
Written By: Kim McAloon Hunting for Password Files on Endpoints As part of the Okta compromise, it was announced that attackers accessed a spreadsheet on Sitel’s internal network called DomAdmins-LastPass.xlsx. The file name suggests that the spreadsheet contained passwords for domain administrator accounts. Users storing passwords in unencrypted documents on company endpoints could expedite post-compromise lateral […]
Since early 2022, events have been changing dramatically in cyberspace. We can divide these events into before and after February 24, the date Russia invaded Ukraine. Before the Russian invasion, there was improved cyber cooperation between Russia and the West which resulted in several key arrests of accused cyber criminals. After the attack, the situation […]