-
Cloud Security Resolutions for a Threat-Free 2025
As the New Year begins, most people are busy crafting their resolutions; promises to hit the gym, learn a new skill, or break an old habit. Businesses navigating the complex digital landscape, on the other hand, face an evolving challenge of critical significance. Fortifying cloud security emerges as the ultimate strategic imperative for organizational resilience. …
-
Understanding DDoS Attacks: A Comprehensive Guide
Businesses and services rely heavily on online presence, the threat of cyberattacks looms large. Among these threats, Distributed Denial of Service (DDoS) attacks stand out due to their ability to paralyze websites and online services. A DDoS attack occurs when multiple compromised systems target a single system, overwhelming it with traffic and rendering it inaccessible…
-
Lessons From the Field: How a Hospital Turned Cyber Challenges Into a Success Story
Every day, a renowned hospital serves the needs of over a million patients, delivering not only world-class care but also hope for healthier futures. But behind the scenes, the hospital’s small but mighty security team was feeling the strain. With two hospital campuses, multiple regional centers, and more than 50 care locations, the pressure to…
-
Rhadamanthys Stealer Analysis for Detection Opportunities
Written by ARC Labs contributor, Shannon Mong Threat Overview Binary Defense ARC Labs’ threat researchers recently dissected a Rhadamanthys Stealer infection chain to uncover detection opportunities that defenders can leverage to strengthen organizational security. In this analysis, we provide general detection guidance and actionable queries for detecting Rhadamanthys Stealer. Recent Campaign Insights Rhadamanthys Stealer surfaced on underground…
-
Lessons from the Field: How a Manufacturing Giant Transformed Its Security Posture
The complexities of cybersecurity often seem insurmountable for large enterprises. For one global manufacturing company, this was a lived reality. With a workforce of over 60,000 employees, more than 450,000 clients, and a steady stream of mergers and acquisitions, their security team faced challenges that felt increasingly impossible to solve. Yet, their journey toward building…
-
Cleo MFT Mass Exploitation Payload Analysis
Written by ARC Labs contributors, John Dwyer and Eric Gonzalez ARC Labs recently capture and analyzed the second and third stage payloads used during a Cleo MFT compromise. The compromise is a result of exploitation of CVE-2024-50623 which allows for unauthorized remote code execution. Additional reports suggest that exploitation of the vulnerability continues to be possible even after…
-
Shining a Light in the Dark – How Binary Defense Uncovered an APT Lurking in Shadows of IT
Written by ARC Labs contributors, John Dwyer, Eric Gonzalez at Binary Defense and Tyler Hudak at TrustedSec In cybersecurity, the threats we don’t see—or don’t expect—often pose the greatest danger. Recently, this became all too clear when three unmanaged AIX servers, sitting exposed on the internet, opened the door for a China-Nexus Threat Actor to launch an…
-
How to Define Your Security Objectives Before Choosing an MDR Provider
With nearly every MSSP and Security company claiming to do Managed Detection and Response (MDR) it’s more important than ever to choose the right MDR provider. Before you start evaluating potential partners, it’s crucial to step back and clearly define your organization’s security objectives. This not only helps in selecting the right provider but also…
-
Cybersecurity Moneyball Part 2: Binary Defense’s New Paradigm in Malware Detection
“Fight Your Enemy Where They Aren’t – Sun Tzu” The post Cybersecurity Moneyball Part 2: Binary Defense’s New Paradigm in Malware Detection appeared first on Binary Defense. Go to Source
-
Understanding Sleep Obfuscation
How Malware Uses Sleep Cycles to Avoid Detection The post Understanding Sleep Obfuscation appeared first on Binary Defense. Go to Source