Diving into Hidden Scheduled Tasks 
Binary Defense
by
1w ago
ARC Labs conducted research and identified gaps in traditional auditing mechanisms, highlighting the security implications of manipulating the SD registry value for a scheduled task. The post Diving into Hidden Scheduled Tasks  appeared first on Binary Defense ..read more
Visit website
Analyzing CryptoJS Encrypted Phishing Attempt 
Binary Defense
by
2w ago
ARC Labs recently analyzed a phishing email used in a credential harvesting campaign that leveraged a lure notifying the target they received a voice message and needed to visit a link to access it.  Analysis of the payload revealed heavily obfuscated HTML data which executed JavaScript code embedded within an SVG image when the page […] The post Analyzing CryptoJS Encrypted Phishing Attempt  appeared first on Binary Defense ..read more
Visit website
Qakbot Strikes Back: Understanding the Threat 
Binary Defense
by
2w ago
New QakBot Campaign   Qakbot, also known as QBot, is a banking trojan and botnet that has been active since 2008. However, last year, the servers associated with Qakbot were taken down in a multinational law enforcement operation called Operation Duck Hunt. Recently, Binary Defense threat researchers analyzed the reemergence of the QakBot botnet. The new […] The post Qakbot Strikes Back: Understanding the Threat  appeared first on Binary Defense ..read more
Visit website
MalSync Teardown: From DLL Hijacking to PHP Malware for Windows  
Binary Defense
by
1M ago
Research and Analysis by Jace Walker (@jw4lsec), Threat Researcher at Binary Defense An analysis conducted by Binary Defense has revealed valuable insights into the workings of MalSync malware, also disputedly known as either DuckTail or SYS01. The analysis covers various aspects such as infection vectors, command line usage, malware capabilities, and reverse engineering efforts to […] The post MalSync Teardown: From DLL Hijacking to PHP Malware for Windows   appeared first on Binary Defense ..read more
Visit website
MDR Metrics that Matter – From Analysts to the Board of Directors 
Binary Defense
by
1M ago
Metrics that Matter are data points that provide a clear understanding of threat levels, risk, impact analysis, and effectiveness in the context of MDR. The post MDR Metrics that Matter – From Analysts to the Board of Directors  appeared first on Binary Defense ..read more
Visit website
Incident Response – IR Planning & MDR Coordination  
Binary Defense
by
2M ago
Incident Response (IR) shapes how effectively an organization can survive and recover from a cyberattack.   The post Incident Response – IR Planning & MDR Coordination   appeared first on Binary Defense ..read more
Visit website
The Role of Deception Technology in Modern Cybersecurity
Binary Defense
by
3M ago
Get the details on deception technology, a cybersecurity tactic that lays digital traps to detect and counteract unauthorized access. The post The Role of Deception Technology in Modern Cybersecurity appeared first on Binary Defense ..read more
Visit website
Demystifying Open XDR: What It Is, How to Do It, and ROI
Binary Defense
by
4M ago
Open Extended Detection and Response (XDR) marks a paradigm shift in enterprise security, focusing on using comprehensive data insights to enhance threat detection and response across diverse systems and environments.   This approach champions flexibility and interoperability over traditional vendor lock-in, allowing for a tailored security posture that keeps pace with the evolving threat landscape. The […] The post Demystifying Open XDR: What It Is, How to Do It, and ROI appeared first on Binary Defense ..read more
Visit website
What Is Digital Risk Protection (DRP)?
Binary Defense
by
5M ago
Digital risk protection is the strategy and implementation of safeguarding an organization's data, reputation, and digital assets from online threats. The post What Is Digital Risk Protection (DRP)? appeared first on Binary Defense ..read more
Visit website
Beyond Alerting: Finding Hidden Threats 
Binary Defense
by
5M ago
Hypothesis-driven threat hunting is a tailored, proactive, and analytical approach to cybersecurity that uses the acumen of seasoned security experts. The post Beyond Alerting: Finding Hidden Threats  appeared first on Binary Defense ..read more
Visit website

Follow Binary Defense on FeedSpot

Continue with Google
Continue with Apple
OR