Binary Defense Vision with UEBA, Simpler Onboarding and 2FA, Improved Threat Hunting and Data Queries, Detection Visualizations

Real People of Binary Defense: Jimmy Byrd

Binary Defense Once Again Acknowledged as a Representative Vendor in Gartner Market Guide for Endpoint Detection and Response Solutions

Threat Intelligence: Make-A-Wish Targeted in Cryptojacking Attack

Threat Intelligence: Instagram Exposes Passwords in Plaintext

Threat Intelligence: Buyers Beware of Banking Trojans on Black Friday

Threat Intelligence: Bitcoin Giveaway Scam Targets Google

Threat Intelligence: Microsoft Zero-day Patched

Threat Intelligence: WordPress Zero-day

Threat Intelligence: Cisco Mistakenly Adds Dirty Cow Exploit Code to its Own Software

Binary Defense and Ingram Micro Announce Strategic Distribution Relationship

Why We Love DerbyCon

Binary Defense Launches Security Executive Network (S.E.N.) Program

Vision EDR Platform Disrupts Another Phishing Attack, Sorry Bad Guys

Announcing Vision 4.0 Platform – Managed EDR Combined with EPP

Social Engineering Attacks and Mitigations Part VII: Whaling

PowerGhost Fileless Cryptocurrency Miner is Actively Targeting Corporate Networks

Social Engineering Attacks and Mitigations Part VI: Vishing

Social Engineering Attacks and Mitigations Part V: Phishing

Social Engineering Attacks and Mitigations Part IV: Tailgating

Binary Defense Acknowledged as a Representative Vendor in Gartner’s Market Guide for Managed Detection and Response Services

Social Engineering Attacks and Mitigations Part III: Dumpster Diving

Social Engineering Attacks and Mitigations Part II: Shoulder Surfing

Social Engineering Attacks and Mitigations Part I

Not all Threats are Cyber Part Two

EvilOSX

Not all Threats are Cyber

The Skiddies are Playing Dress-up

Revisiting Meltdown and Spectre, Are the Updates Safe?

Social Media: The Overlooked Critical Infrastructure of Chinese Manufacturing

Critical Vulnerability Found in Grammarly Spell Checker

Fake Online FBI Scam

Massive Botnet Turns Windows Machines into Miners

Netflix Being Phished Again

LightsOut Adware Attack Prevents Users From Closing Ads

Chrome Extension Contains Cryptocurrency Miner

Digmine Virus Spreads Via Facebook Messenger

Google AdWords and Google Sites Used to Spread Malware

Dune Game Leaks Sensitive Data

Eighty-five Google Play Store Apps Were Stealing Credentials

Top Five Cyber-Security Predictions for 2018

Spider Ransomware

Fidget Spinner App Sending Users’ Data to China

1.4 Billion Credentials Found on Dark-Net

Over 5,000 WordPress Sites Infected with Keylogger

Microsoft Releases Malware Patch for its…Malware Protection Engine

PayPal’s TIO Network says Data Breach May Affect 16 Million

Microsoft Word Vulnerability Allows Hackers to Gain Control of PCs

Microsoft Office Vulnerability Lets Attackers Install Malware Without User Interaction

Binary Defense in Gartner EDR Market Guide

LockCrypt Ransomware

New Vulnerability Uses Antivirus Software to Inject Malware

Netflix Phishing Scam

Printers Used for DoS Attacks

MantisTek GK2 Keyboard Sends Data to China

Tor Browser Vulnerability

Popular Anime-Streamer, Crunchyroll, Hacked

$150,000 Stolen from Cryptocurrency Wallets

Silence Banking Trojan

Data Breaches During First Half of 2017 Exceed all of 2016

Attackers Could Possibly Make LG Smart Appliances Spy Robots

Fake Cryptocurrency Apps Steal User Data

Microsoft Word DDE Exploit used in Malware Attacks

New "Reaper" Malware has Infected Two Million IoT Devices

Magniber Ransomware

Hackers Can Hack Kids' Smartwatches and Track Locations

Botnet Ransomware will Screengrab your Desktop

DoubleLocker Android Ransomware

KRACK Attack WPA Vulnerabilities

FreeMilk Phishing Scam Spreads Malware Via Email

Bridging the Cyber Security Culture Clash

The Certainty of Uncertainty...Why Cyber Security Resiliency Matters

4 Crucial Steps to Getting the Best Value out of Your SIEM

Enhanced Endpoint Protection: FedEx Invoice Variation

B2B USA Business Spam List

The Vision Platform Adds Support for OS X and Linux

Petya Ransomware Without The Fluff

Binary Defense and the Brakeing Down Security Podcast!

Binary Defense's Vision Platform 3.1 Released

New Video Explaining Binary Defense's Vision Platform

WannaCry: Mass Ransomware Worm Capabilities Campaign - What to do.

PowerShell Injection with Fileless Payload Persistence and Bypass Techniques

Binary Defense’s Vision Platform v3 Released – Welcome to Containment

The Dangers of Embedded LNK files in Office Documents

Reliably Detecting Pass the Hash Through Event Log Analysis

Distributed HoneyNets and Understanding Attack Emulation with BDS Vision

BDS Vision - Real-Time Detection Software

New Tool Release: GoatRider - OTX, Artillery, and Alexa lookups

Tool Update: Auto-OSSEC + MSI Builder

Tool Release: Auto-OSSEC - automated OSSEC deployment

Getting better at logs

Adaptive Monitoring

Mick Douglas joins the BDS Family!

Anthem Phishing Schemes - Beware

Artillery 1.4 Released - New major features

Active Phishing Campaign with PowerShell Injection

NOAA Reportedly Hacked by China

The ISIS Cyber Security Threat

Artillery version 1.3 released - new features and bug fixes.

United States Postal Service Breached

Project Artillery - Now a Binary Defense Project!

Active Shellshock SMTP Botnet Campaign

Binary Defense Launches