So many great things have happened in 2024, including amazing blogs from our team. See our top 10 most read blogs from 2024 below: 1. Technical Analysis: Killer Ultra Malware Targeting EDR Products in Ransomware Attacks 2. Detecting Ransomware's Stealthy Boot Configuration Edits 3. Shining a Light in the Dark - How Binary Defense Uncovered an APT Lurking in Shadows of IT 4. Diving into Hidden Scheduled Tasks 5. Wineloader - Analysis of the Infection Chain 6. Digging Through Rust to Find Gold: Extracting Secrets from Rust Malware 7. Beyond Alerting: The Need for Behavior-Based Detection Strategy 8. LetMeowIn - Analysis of a Credential Dumper 9. Cleo MFT Mass Exploitation Payload Analysis 10. Running Malware Below the OS - The State of UEFI Firmware Exploitation Find all links below!👇 #SecurityBlog #2024 #Cybersecurity
6. Digging Through Rust to Find Gold: Extracting Secrets from Rust Malware: https://www.binarydefense.com/resources/blog/digging-through-rust-to-find-gold-extracting-secrets-from-rust-malware/ 7. Beyond Alerting: The Need for Behavior-Based Detection Strategy: https://www.binarydefense.com/resources/blog/the-need-for-behavior-based-detection-strategy/ 8. LetMeowIn - Analysis of a Credential Dumper: https://www.binarydefense.com/resources/blog/letmeowin-analysis-of-a-credential-dumper/ 9. Cleo MFT Mass Exploitation Payload Analysis: https://www.binarydefense.com/resources/blog/cleo-mft-mass-exploitation-payload-analysis/ 10. Running Malware Below the OS - The State of UEFI Firmware Exploitation: https://www.binarydefense.com/resources/blog/running-malware-below-the-os-the-state-of-uefi-firmware-exploitation/
1. Technical Analysis: Killer Ultra Malware Targeting EDR Products in Ransomware Attacks: https://www.binarydefense.com/resources/blog/technical-analysis-killer-ultra-malware-targeting-edr-products-in-ransomware-attacks/ 2. Detecting Ransomware's Stealthy Boot Configuration Edits: https://www.binarydefense.com/resources/blog/detecting-ransomwares-stealthy-boot-configuration-edits/ 3. Shining a Light in the Dark - How Binary Defense Uncovered an APT Lurking in Shadows of IT: https://www.binarydefense.com/resources/blog/shining-a-light-in-the-dark-how-binary-defense-uncovered-an-apt-lurking-in-shadows-of-it/ 4. Diving into Hidden Scheduled Tasks: https://www.binarydefense.com/resources/blog/diving-into-hidden-scheduled-tasks/ 5. Wineloader - Analysis of the Infection Chain: https://www.binarydefense.com/resources/blog/wineloader-analysis-of-the-infection-chain/