-
Cleo MFT Mass Exploitation Payload Analysis
Written by ARC Labs contributors, John Dwyer and Eric Gonzalez ARC Labs recently capture and analyzed the second and third stage payloads used during a Cleo MFT compromise. The compromise is a result of exploitation of CVE-2024-50623 which allows for unauthorized remote code execution. Additional reports suggest that exploitation of the vulnerability continues to be possible even after…
-
Shining a Light in the Dark – How Binary Defense Uncovered an APT Lurking in Shadows of IT
Written by ARC Labs contributors, John Dwyer, Eric Gonzalez at Binary Defense and Tyler Hudak at TrustedSec In cybersecurity, the threats we don’t see—or don’t expect—often pose the greatest danger. Recently, this became all too clear when three unmanaged AIX servers, sitting exposed on the internet, opened the door for a China-Nexus Threat Actor to launch an…
-
How to Define Your Security Objectives Before Choosing an MDR Provider
With nearly every MSSP and Security company claiming to do Managed Detection and Response (MDR) it’s more important than ever to choose the right MDR provider. Before you start evaluating potential partners, it’s crucial to step back and clearly define your organization’s security objectives. This not only helps in selecting the right provider but also…
-
Cybersecurity Moneyball Part 2: Binary Defense’s New Paradigm in Malware Detection
“Fight Your Enemy Where They Aren’t – Sun Tzu” The post Cybersecurity Moneyball Part 2: Binary Defense’s New Paradigm in Malware Detection appeared first on Binary Defense. Go to Source
-
Understanding Sleep Obfuscation
How Malware Uses Sleep Cycles to Avoid Detection The post Understanding Sleep Obfuscation appeared first on Binary Defense. Go to Source
-
How Our Dedicated Resources Differ from Staff Augmentation
Integrating Binary Defense Dedicated Security Resources into your team brings deeper insights and proactive defense, far beyond what staff augmentation can offer. The post How Our Dedicated Resources Differ from Staff Augmentation appeared first on Binary Defense. Go to Source
-
Technical Analysis: Killer Ultra Malware Targeting EDR Products in Ransomware Attacks
This post was written by John Dwyer, Director of Security Research at Binary Defense, and made possible through the contributions of TrustedSec Senior Research Analyst Kevin Haubris and Eric Gonzalez of Binary Defense. ARC Labs recently recovered a tool leveraged in Qilin ransomware attacks aimed at impairing defenses by disabling popular endpoint detection and response…
-
The Imperative of Threat Hunting for a Mature Security Posture
Threat Hunting has transitioned from being a luxury to a fundamental necessity The post The Imperative of Threat Hunting for a Mature Security Posture appeared first on Binary Defense. Go to Source
-
Cybersecurity Moneyball Part 1: Managed Deception for Easy Outs
“When your enemies are making mistakes, don’t interrupt them. They’re just giving you an out, man. They’re just giving it to you. Take it and say thank you.” (Moneyball [Motion Picture], Columbia Pictures) The post Cybersecurity Moneyball Part 1: Managed Deception for Easy Outs appeared first on Binary Defense. Go to Source
-
Xerox Printers Vulnerability Puts Data Security at Risk
Cybersecurity experts are raising concerns over a newly discovered vulnerability in Xerox printers that could potentially compromise sensitive information. The vulnerability, which affects a variety of Xerox printer models, has the potential to allow unauthorized access to both the device and any data it handles. With businesses increasingly relying on digital solutions, this vulnerability poses…