Report: Ransomware Attacks Doubled Between 2020, 2021
A recent analysis from the U.S. Treasury Department’s Financial Crimes Enforcement Network (FinCEN) found that ransomware attacks doubled between 2020 and 2021, including a disproportionately large spike coming from Russia. Ransomware is malicious
Microsoft Discloses Two New Active MS Exchange Zero-Day Bugs, No Immediate Fix
On Thursday, September 29th, Microsoft publicly disclosed two unpatched vulnerabilities impacting on-premises Microsoft Exchange servers that were capable of granting remote access to threat actors. These zero-day vulnerabilities have been identified as CVE-2022-41040, which is
How The Defense in Depth Strategy Protects Organizations
Contrary to the promises of the various security appliance providers, there is no single solution in information security to defend against the various attack vectors available to threat actors (TAs). However, we recommend that
Why Social Media Data Will Play A Bigger Role in Digital Forensic Investigations
As a digital forensics and incident response (DFIR) firm, BinaryLab has conducted numerous investigations to provide stakeholders with timeline and root cause analysis for issues ranging from business email compromise up to ransomware attacks.
Hackers Exploit Critical Atlassian Confluence Flaw
Researchers have discovered an unauthenticated Remote Code Execution (RCE) flaw, which is being tracked as CVE-2022-26134 and can compromise even the most up-to-date, patched version of Atlassian’s Confluence Server solution. On June 2nd, Atlassian
What You Need to Know About the Strengthening American Cybersecurity Act
In the wake of the Russian military invasion of Ukraine, fear of cyberwarfare has risen among the American public, many of whom still have the Colonial Pipeline ransomware attack fresh on their minds. In
What the Recent Okta Compromise Could Mean for You and Your Business
Okta, a massively popular company which provides identity and access management (IAM) services to clients worldwide, was recently targeted by threat actor Lapsus$. The compromise of Okta and other providers of IAM services
Cybersecurity Capability Maturity Model Breakdown: Part 1
At BinaryShield, it is our philosophy that custom-tailored, proactive solutions that align with best security practices and regulatory frameworks are the best methods to address people, technologies, and facilities to provide actionable cybersecurity strategies.
D.C. and Data Breaches: What You Need to Know
The ubiquity of concerted campaigns through phishing and various other methods of malware deployment have led to individuals, small and midsized businesses (SMBs), and the largest companies worldwide to deal with the brutal impact
The Dangers of Consent Phishing
Cyber incidents often rely on human engagement to enable malware. Despite deploying security controls on the user’s account, target environment, and device, additional emerging threats may occur which require both users and enterprise administrators