Aug 23

Vision EDR Platform Disrupts Another Phishing Attack, Sorry Bad Guys

Binary Defense Vision EDR can easily detect macro malware leveraging Windows PowerShell and, in this case, helped a customer defend against the Emotet downloader Trojan.

read more →
Aug 22

Announcing Vision 4.0 Platform – Managed EDR Combined with EPP

Introducing Vision 4.0 Platform Managed Endpoint Detection and Response (EDR) with built-in Endpoint Platform Protection (EPP) by Binary Defense.

read more →
Aug 03

Social Engineering Attacks and Mitigations Part VII: Whaling

Phishing is the most common type of social engineering attack that has targeted companies for years. Phishing attacks get sent out to a mass amount of people, however, company executives may get hit with something more specifically targeting them—a special type of phishing called whaling.

read more →
Jul 30

PowerGhost Fileless Cryptocurrency Miner is Actively Targeting Corporate Networks

A fileless cryptocurrency miner dubbed PowerGhost is compromising workstations and servers by utilizing the EternalBlue exploit and Mimikatz. The threat compromises a single computer on a targeted network and may spread to other systems and servers across an organization. The PowerGhost threat was first seen compromising organizations in India, Columbia, Turkey, Europe, and the US.

read more →
Jul 27

Social Engineering Attacks and Mitigations Part VI: Vishing

A type of social engineering attack that is closely related to phishing is vishing. Vishing is the act of phishing over the telephone and has gained popularity recently.

read more →
Jul 19

Social Engineering Attacks and Mitigations Part V: Phishing

Phishing is a common social engineering tactic ever since the early days of computers and the internet. Phishers not only are trying to gain sensitive information like usernames, passwords, and credit card details, but also may look to cause damage and destruction to your data or accounts just for kicks.

read more →
Jul 10

Social Engineering Attacks and Mitigations Part IV: Tailgating

Social Engineering attacks can be physical or cyber. One type of physical attack includes Tailgating, and it is not done in a car. Tailgating, in a social engineering sense, is when a person gains unwanted entrance into a facility by using tricks and tactics to fool the employees of that company.

 

read more →
Jun 28

Binary Defense Acknowledged as a Representative Vendor in Gartner’s Market Guide for Managed Detection and Response Services

Binary Defense, a leading provider of Managed Detection and Response (MDR) and Managed Endpoint Detection and Response (EDR) services, is happy to announce it has been identified as a Representative Vendor in the Gartner "Market Guide for Managed Detection and Response Services" report.

read more →
Jun 26

Social Engineering Attacks and Mitigations Part III: Dumpster Diving

Considering various types of Social Engineering attacks, realize that all of them can be dangerous and have detrimental effects on the entire organization. Many people believe they know the different kinds of Social Engineering and how to avoid them, but they really only know a few different methods, mostly on the cyber side. While many of these attacks are cyber, there are also plenty that are physical. This week, we will look into the dirty job of dumpster diving and how to prevent it.

read more →
Jun 22

Social Engineering Attacks and Mitigations Part II: Shoulder Surfing

Shoulder surfing is something that most people do every day in one way or another. Most of the time, this simple practice is done without the intention of stealing information. This practice can be used for malicious purposes however, so it is important to prevent unwanted parties from viewing confidential information or trade secrets displayed on your screen.

read more →