<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=694598870919452&amp;ev=PageView&amp;noscript=1">
Dec 27

Threat Intelligence: Customer Information Exposed in Caribou Coffee Data Breach

Image by Getty Images

read more →
Dec 19

Threat Intelligence: NASA Hit With Data Breach

Current and former employees of NASA from July 2006 through October 2018 could have been affected by a data breach, but the exact number is not known at this time. A server containing 
PII (Personally Identifiable Information) of employee’s was discovered to have been hacked on October 23rd. Cybersecurity personnel belonging to NASA immediately began securing the server that had been breached to prevent any further information from being compromised. Federal cybersecurity acquaintances have also been called in to help determine how the breach happened, and what information was accessed.

read more →
Dec 17

Threat Intelligence: ZipRecruiter Suffers Data Breach

The issue is with part of ZipRecruiter's site that enables a business with authorization to access the CV database to contact the person seeking a job. After an employer gets online and accesses a resume, they can decide to shortlist some of the candidates when they are provided with a candidate form. The problem is that unauthorized users are able to access the form while not having access to the CV database.

read more →
Dec 14

Threat Intelligence: New LamePyre Mac Malware

The third malware strain targeting MacOS this month has been discovered and dubbed LamePyre. Although it appears to still be under development, the malware is able to perform a few functions. LamePyre traps its victims by showing up as a duplicate of the Discord app utilized by gamers. In actuality, it is only a shell which appears as the run of the mill Automator symbol in the menu bar on MacOS when kept running by the user.

read more →
Dec 11

Binary Defense Vision with UEBA, Simpler Onboarding and 2FA, Improved Threat Hunting and Data Queries, Detection Visualizations

Binary Defense announces Agent 4.4 and Server 2.73 packed with substantial new features and enhancements to the Binary Defense Vision platform.

read more →
Dec 10

Real People of Binary Defense: Jimmy Byrd

Welcome to our blog series introducing the Real People at Binary Defense where you get to go inside our offices and meet the contributing members of our Binary Defense team.

read more →
Dec 06

Binary Defense Once Again Acknowledged as a Representative Vendor in Gartner Market Guide for Endpoint Detection and Response Solutions


Binary Defense, a leading provider of Endpoint Detection and Response (EDR) and Managed Detection and Response (MDR) services, is happy to announce it has been identified for the second year in a row as a Representative Vendor in the Gartner "Market Guide for Endpoint Detection and Response Solutions" report.

read more →
Nov 20

Threat Intelligence: Make-A-Wish Targeted in Cryptojacking Attack

Make-A-Wish never patched the Drupal vulnerability which has allowed hackers to steal CPU-cycles to allow them to mine Monero cryptocurrency. Researchers have realized the miner has been active since May and is JavaScript-based after taking a quick look at drupalupdates.tk domain.“Embedded in the site was a script using the computing power of visitors to the site to mine cryptocurrency into the cybercriminals’ pockets, making their ‘wish’ to be rich, come true.”

read more →
Nov 19

Threat Intelligence: Instagram Exposes Passwords in Plaintext

The popular social media photo sharing app Instagram has recently patched a bug in their website that accidentally exposed some of their users’ passwords in plaintext. The bug resides in the new “Download Your Data” feature. This new feature allows the user to download a copy of all the data they have shared with the site, including comments, posts, photos, and other information.

read more →
Nov 16

Threat Intelligence: Buyers Beware of Banking Trojans on Black Friday

Account-managing Trojans customarily target clients of online money related administrations--searching for budgetary information to take, or building botnets out of hacked gadgets for future assaults. Be that as it may, after some time a few of these Trojans have upgraded their usefulness, propelling new variations and broadening their range. Some are currently ready to get root access to tainted gadgets, perform exchanges, inject malicious code, record video, and the sky is the limit from there.

read more →