News
Entertainment
Science & Technology
Life
Culture & Art
Hobbies
News
Entertainment
Science & Technology
Culture & Art
Hobbies
Discover how Binary Defense Dedicated Resources go beyond traditional staff augmentation. This blog breaks down the key differences that set our approach apart, offering more than just extra hands to enhance your cybersecurity efforts.
Discover how Binary Defense is revolutionizing malware detection with innovative, patent-pending technology that targets fundamental malware processes, ensuring future-resistant and efficient detection methods without relying on signature-based approaches. Learn about the shift in detection strategies and how it impacts the cybersecurity landscape.
Threat Hunting should be considered a foundational component of a security strategy which can be a significant driver in an organization’s security maturity and assist in making threat informed decisions about the future.
ARC Labs recently recovered a tool leveraged in Qilin ransomware attacks aimed at impairing defenses by disabling popular endpoint detection and response (EDR) and antivirus (AV) tools. ARC Labs has labeled this malware as "Killer Ultra" based on a module name within the malware.
Explanation of boot process of modern UEFI machines, as well as some of its built-in protections, and we will explore the techniques used by various real-world bootkits to circumvent these protections and hijack the boot process.
A Write-Up by TrustedSec’s Research Lead Carlos Perez and Binary Defense’s Research Lead Jonathan Johnson Introduction While it is important to discover new tradecraft, it is equally important to explore well-established and widely used techniques. The Binary Defense research team collaborated with the TrustedSec research team to dive into adversarial Lightweight Directory Access Protocol (LDAP) […]
[ By: Jonny Johnson, Senior Researcher of Adversarial Techniques and Capabilities at Binary Defense Introduction DLL Hijack-based attacks have been popular within the offensive community for several years. This technique has been used to achieve initial access, persistence, or privilege escalation in several environments. Due to the volume of DLL loads that happen in an […]
This blog post was co-authored with Charlie Clark and Andrew Schwartz from TrustedSec 1 Introduction One thing often forgotten is that detection engineering isn’t always centered around 1 action to 1 query but also to drive effective incident response to optimize the triage of an alert. This is best served with context. We often say, […]