Binary Defense

Cybersecurity Managed Detection & Response
  1. With nearly every MSSP and Security company claiming to do Managed Detection and Response (MDR) it’s more important than ever to choose the right MDR provider. Before you start evaluating potential partners, it’s crucial to step back and clearly define your organization’s security objectives. This not only helps in selecting the right provider but also […]

    The post How to Define Your Security Objectives Before Choosing an MDR Provider  appeared first on Binary Defense.

  2. Written by ARC Labs contributors, John Dwyer, Eric Gonzalez at Binary Defense and Tyler Hudak at TrustedSec In cybersecurity, the threats we don’t see—or don’t expect—often pose the greatest danger. Recently, this became all too clear when three unmanaged AIX servers, sitting exposed on the internet, opened the door for a China-Nexus Threat Actor to launch an […]

    The post Shining a Light in the Dark – How Binary Defense Uncovered an APT Lurking in Shadows of IT appeared first on Binary Defense.

  3. Integrating Binary Defense Dedicated Security Resources into your team brings deeper insights and proactive defense, far beyond what staff augmentation can offer.

    The post How Our Dedicated Resources Differ from Staff Augmentation  appeared first on Binary Defense.

  4. How Malware Uses Sleep Cycles to Avoid Detection

    The post Understanding Sleep Obfuscation appeared first on Binary Defense.

  5. "Fight Your Enemy Where They Aren't - Sun Tzu"

    The post Cybersecurity Moneyball Part 2: Binary Defense’s New Paradigm in Malware Detection appeared first on Binary Defense.

  6. Threat Hunting has transitioned from being a luxury to a fundamental necessity

    The post The Imperative of Threat Hunting for a Mature Security Posture   appeared first on Binary Defense.

  7. This post was written by John Dwyer, Director of Security Research at Binary Defense, and made possible through the contributions of TrustedSec Senior Research Analyst Kevin Haubris and Eric Gonzalez of Binary Defense. ARC Labs recently recovered a tool leveraged in Qilin ransomware attacks aimed at impairing defenses by disabling popular endpoint detection and response […]

    The post Technical Analysis: Killer Ultra Malware Targeting EDR Products in Ransomware Attacks appeared first on Binary Defense.

  8. "When your enemies are making mistakes, don't interrupt them. They’re just giving you an out, man. They’re just giving it to you. Take it and say thank you." (Moneyball [Motion Picture], Columbia Pictures)

    The post Cybersecurity Moneyball Part 1: Managed Deception for Easy Outs  appeared first on Binary Defense.

  9. By ARC Labs contributor, Shannon Mong ARC Labs recently analyzed a sample of the Wineloader backdoor for infection chain analysis and detection opportunities to help defenders protect their organizations. Through this analysis, ARC Labs is providing defenders with general detection guidance and specific KQL queries to detect Wineloader activity within Microsoft Sentinel. Additionally, ARC Labs has provided […]

    The post Wineloader – Analysis of the Infection Chain appeared first on Binary Defense.

  10. Engineered to evade top security products and stealthily harvest credentials from the LSASS process, LetMeowIn represents a significant challenge for cybersecurity defenders.

    The post LetMeowIn – Analysis of a Credential Dumper appeared first on Binary Defense.

  11. Operating a business within the modern threat landscape can often appear like an impossible task. With a constant stream of new vulnerabilities, malware, and adversaries flowing, security leadership can often become overwhelmed and stuck in “analysis paralysis” struggling to identify what threats to invest resources towards.   It’s no secret that cybercrime has become big business […]

    The post Communication is Key – Leveraging Business Frameworks to Develop a Detection and Response Strategy  appeared first on Binary Defense.

  12. ARC Labs conducted research and identified gaps in traditional auditing mechanisms, highlighting the security implications of manipulating the SD registry value for a scheduled task.

    The post Diving into Hidden Scheduled Tasks  appeared first on Binary Defense.