IMPORTANT - EIN Presswire is proud to announce the launch of its AI-powered press release generator. Try it now!

There were 535 press releases posted in the last 24 hours and 398,889 in the last 365 days.

Threat Watch | Binary Defense - Ohio Press Releases

45 Press Releases
  • Published on July 16, 2024 - 14:09 GMT

    Technical Analysis: Killer Ultra Malware Targeting EDR Products in Ransomware Attacks

    This post was written by John Dwyer, Director of Security Research at Binary Defense, and made possible through the contributions of TrustedSec Senior Research Analyst Kevin Haubris and Eric Gonzalez of Binary Defense. ARC Labs recently recovered a tool …

    Distribution channels:
  • Published on June 11, 2024 - 15:21 GMT

    Cybersecurity Moneyball Part 1: Managed Deception for Easy Outs 

    In a previous blog, we discussed how the “businessification” of cybercrime has coalesced around tried and true tools, techniques, and procedures, giving us a solid understanding of how these attacks happen. Security product vendors have made massive …

    Distribution channels:
  • Published on June 4, 2024 - 18:26 GMT

    Wineloader – Analysis of the Infection Chain

    By ARC Labs contributor, Shannon Mong ARC Labs recently analyzed a sample of the Wineloader backdoor for infection chain analysis and detection opportunities to help defenders protect their organizations. Through this analysis, ARC Labs is providing …

    Distribution channels:
  • Published on May 21, 2024 - 16:07 GMT

    LetMeowIn – Analysis of a Credential Dumper

    By ARC Labs contributors, John Dwyer and Harold Tabellion In April 2024, security researcher Meowmycks released a LetMeowIn which was designed to harvest credentials from the LSASS process on Microsoft Windows systems. In this blog, ARC Labs will provide …

    Distribution channels:
  • Published on April 23, 2024 - 21:13 GMT

    Communication is Key – Leveraging Business Frameworks to Develop a Detection and Response Strategy 

    Operating a business within the modern threat landscape can often appear like an impossible task. With a constant stream of new vulnerabilities, malware, and adversaries flowing, security leadership can often become overwhelmed and stuck in “analysis …

    Distribution channels:
  • Published on April 16, 2024 - 16:02 GMT

    Diving into Hidden Scheduled Tasks 

    In April 2022, Microsoft released a report detailing how the “Tarrask” malware manipulated the Security Descriptor of Scheduled Tasks as a defense evasion technique to hide malicious scheduled tasks from discovery using traditional audit tools such as …

    Distribution channels:
  • Published on April 11, 2024 - 18:58 GMT

    Sisense Data Compromise: ARC Labs Intelligence Flash

    ARC Labs and Binary Defense are actively monitoring a compromise of data associated with Sisense, a company that provides data analytic product and services. At this point, it is unknown if the Sisense’s network was compromised but independent researchers …

    Distribution channels:
  • Published on April 9, 2024 - 17:57 GMT

    Analyzing CryptoJS Encrypted Phishing Attempt 

    ARC Labs recently analyzed a phishing email used in a credential harvesting campaign that leveraged a lure notifying the target they received a voice message and needed to visit a link to access it.  Analysis of the payload revealed heavily obfuscated HTML …

    Distribution channels:
  • Published on April 4, 2024 - 15:34 GMT

    Qakbot Strikes Back: Understanding the Threat 

    New QakBot Campaign   Qakbot, also known as QBot, is a banking trojan and botnet that has been active since 2008. However, last year, the servers associated with Qakbot were taken down in a multinational law enforcement operation called Operation Duck Hunt …

    Distribution channels:
  • Published on March 19, 2024 - 18:12 GMT

    MalSync Teardown: From DLL Hijacking to PHP Malware for Windows  

    Research and Analysis by Jace Walker (@jw4lsec), Threat Researcher at Binary Defense An analysis conducted by Binary Defense has revealed valuable insights into the workings of MalSync malware, also known as the DuckTail PHP variant. The analysis covers …

    Distribution channels:
  • Published on March 13, 2024 - 18:27 GMT

    MDR Metrics that Matter – From Analysts to the Board of Directors 

    Effective cybersecurity relies on selecting the right metrics to inform and guide decision-making, but determining the right metrics is not always clear. Metrics that matter are tailored to the needs of all stakeholders, from analysts to board members—and …

    Distribution channels:
  • Published on February 20, 2024 - 15:51 GMT

    Incident Response – IR Planning & MDR Coordination  

    A robust IR plan ensures that an organization is prepared to respond swiftly and efficiently to potential threats. Coordinating IR planning with your Managed Detection and Response (MDR) partner is an essential component. Successful defense requires …

    Distribution channels:
  • Published on January 11, 2024 - 15:35 GMT

    The Role of Deception Technology in Modern Cybersecurity

    The role of deception technology in modern cybersecurity is to turn the tables on cybercriminals, transforming networks from passive targets into active traps.   Deception gives security teams the chance to use hackers’ own methods against them, as well as …

    Distribution channels:
  • Published on December 20, 2023 - 14:56 GMT

    Demystifying Open XDR: What It Is, How to Do It, and ROI

    Open Extended Detection and Response (XDR) marks a paradigm shift in enterprise security, focusing on using comprehensive data insights to enhance threat detection and response across diverse systems and environments.   This approach champions flexibility …

    Distribution channels:
  • Published on December 6, 2023 - 17:58 GMT

    What Is Digital Risk Protection (DRP)?

    Digital risk protection is the strategy and implementation of protecting an organization’s data, reputation, and digital assets from online threats.   DRP extends across visible, deep, and dark web environments to identify and mitigate risks that could …

    Distribution channels:
  • Published on November 28, 2023 - 16:59 GMT

    Beyond Alerting: Finding Hidden Threats 

    Hypothesis-driven threat hunting is a tailored, proactive, and deeply analytical approach to cybersecurity. It leverages the acumen of seasoned security experts to predict and pre-empt potential attack vectors, delivering a dynamic and robust defense …

    Distribution channels:
  • Published on November 14, 2023 - 17:15 GMT

    Running Malware Below the OS – The State of UEFI Firmware Exploitation

    By Adam Paulina, Threat Researcher Intern Usually when we think of malware infections, we think of malicious programs running on top of the operating system, usually Windows. These programs might use techniques like privilege escalation, running in memory …

    Distribution channels:
  • Published on November 9, 2023 - 15:16 GMT

    The Role of AI/ML in Security Operations

    By David Kennedy, Co-Founder & Chief Hacking Officer In cybersecurity today, AI and ML are integral components driving change.   While AI and ML-related marketing language might be running amok, the reality is that these technologies aren’t just …

    Distribution channels:
  • Published on November 7, 2023 - 19:43 GMT

    Beyond Alerting: The Need for Behavior-Based Detection Strategy

    What Is Signature-Based Detection?  Signature-based detection is a method used in cybersecurity to identify threats based on known attributes. In this model, specific atomic indicators such as file hashes, IP addresses, and domain names are extracted from …

    Distribution channels:
  • Published on October 30, 2023 - 17:38 GMT

    Uncovering Adversarial LDAP Tradecraft

    A Write-Up by TrustedSec’s Research Lead Carlos Perez and Binary Defense’s Research Lead Jonathan Johnson Introduction While it is important to discover new tradecraft, it is equally important to explore well-established and widely used techniques.  The …

    Distribution channels: