Explore how CVE-2025-53770 mirrors past web application exploits like ProxyLogon and Confluence RCE, revealing that despite new vulnerabilities, attacker tactics remain strikingly consistent — from deserialization to persistence.| Binary Defense
How NIST Cybersecurity Framework 2.0 (CSF 2.0) empowers small and mid-market businesses to build strong, scalable cybersecurity programs. Learn why this practical, risk-based framework is an ideal starting point—even for organizations with limited resources.| Binary Defense
Cybersecurity is a data problem—too much noise, not enough context. Learn how Binary Defense uses an attacker’s mindset, tailored detection, and continuous feedback to make sense of security data and improve threat response.| Binary Defense
Lessons From the Field: How a Global Motion Control Company Transformed Its Security Operations through Binary Defense MDR| Binary Defense
Paste, Click, Compromised| Binary Defense
Written by ARC Labs contributors, Adam Paulina Binary Defense ARC Labs researchers recently investigated what appears to be a novel infostealer discovered in the wild and named it MalenuStealer. An infostealer is a type of malicious software crafted to gather personal data (usernames, passwords, and payment information) from victims. Discord, on the other hand, is a popular online […] The post A Look at a Novel Discord Phishing Attack appeared first on Binary Defense.| Binary Defense
For business leaders, cyber resilience ensures continuity in the face of disruption. For practitioners, it’s about having the right tools, processes, and mindset to combat evolving threats effectively.| Binary Defense
Lessons From the Field: How a Global Motion Control Company Transformed Its Security Operations through Binary Defense MDR| Binary Defense
Binary Defense provides security operations and a personalized Managed Detection and Response solution by collaborating with and crafting an effective security strategy to accelerate detection, investigation, and response to potential threats, giving you actionable insights, within minutes not hours, confidence in your defenses, and time back that matter most to your business.| Binary Defense
Written by ARC Labs contributors, John Dwyer and Eric Gonzalez ARC Labs recently discovered a JavaScript-based credential harvesting campaign leveraging fake voicemail notifications as a lure to capture Microsoft 365 credentials. ARC Labs has observed that JavaScript-based credential harvesting campaigns have seen a significant uptick, becoming a prevalent threat in the cybersecurity landscape. Attackers increasingly utilize obfuscation and […] The post Analysis of a JavaScript-based Phi...| Binary Defense
Every day, a renowned hospital serves the needs of over a million patients, delivering not only world-class care but also hope for healthier futures. But behind the scenes, the hospital’s small but mighty security team was feeling the strain. With two hospital campuses, multiple regional centers, and more than 50 care locations, the pressure to […] The post Lessons From the Field: How a Hospital Turned Cyber Challenges Into a Success Story appeared first on Binary Defense.| Binary Defense
Written by ARC Labs contributors, John Dwyer and Eric Gonzalez ARC Labs recently capture and analyzed the second and third stage payloads used during a Cleo MFT compromise. The compromise is a result of exploitation of CVE-2024-50623 which allows for unauthorized remote code execution. Additional reports suggest that exploitation of the vulnerability continues to be possible even after […] The post Cleo MFT Mass Exploitation Payload Analysis appeared first on Binary Defense.| Binary Defense
The complexities of cybersecurity often seem insurmountable for large enterprises. For one global manufacturing company, this was a lived reality. With a workforce of over 60,000 employees, more than 450,000 clients, and a steady stream of mergers and acquisitions, their security team faced challenges that felt increasingly impossible to solve. Yet, their journey toward building […] The post Lessons from the Field: How a Manufacturing Giant Transformed Its Security Posture appeared first...| Binary Defense
ARC Labs recently recovered a tool leveraged in Qilin ransomware attacks aimed at impairing defenses by disabling popular endpoint detection and response (EDR) and antivirus (AV) tools. ARC Labs has labeled this malware as "Killer Ultra" based on a module name within the malware.| Binary Defense
The issue with deception does not appear to be within the deception concepts but rather in providers not offering a solution that addresses the issues facing deception adoption.| Binary Defense
Sisense provides data analytics products and services. Researchers and government agencies have found Sisense-related data outside the authorized space, but it is unclear if Sisense's network has been breached.| Binary Defense
Behavior-based detection focuses on understanding and responding to threats by analyzing their actions and patterns, rather than relying on known attributes.| Binary Defense