Thought Leadership2021-12-28T16:29:55+00:00
26Jul, 2022

Why Social Media Data Will Play A Bigger Role in Digital Forensic Investigations

As a digital forensics and incident response (DFIR) firm, BinaryLab has conducted numerous investigations to provide stakeholders with timeline and root cause analysis for issues ranging from business email compromise up to ransomware attacks. An oft-forgotten area of concern, however, is social media. Social media channels can be a stand-alone area of investigation

3Jun, 2022

Hackers Exploit Critical Atlassian Confluence Flaw

Researchers have discovered an unauthenticated Remote Code Execution (RCE) flaw, which is being tracked as CVE-2022-26134 and can compromise even the most up-to-date, patched version of Atlassian’s Confluence Server solution. On June 2nd, Atlassian released an advisory stating that versions of Confluence Server and Data Center 7.4.0 and higher are potentially vulnerable. Security

19Apr, 2022

What You Need to Know About the Strengthening American Cybersecurity Act

In the wake of the Russian military invasion of Ukraine, fear of cyberwarfare has risen among the American public, many of whom still have the Colonial Pipeline ransomware attack fresh on their minds. In response, the U.S. government is seeking not only to address these events, but also to raise awareness and security compliance

7Apr, 2022

What the Recent Okta Compromise Could Mean for You and Your Business

Okta, a massively popular company which provides identity and access management (IAM) services to clients worldwide, was recently targeted by threat actor Lapsus$. The compromise of Okta and other providers of IAM services is highly sensitive and potentially far-reaching as Okta’s IAM services alone allow approximately 15,000 companies to securely log into multiple

10Feb, 2022

Cybersecurity Capability Maturity Model Breakdown: Part 1

At BinaryShield, it is our philosophy that custom-tailored, proactive solutions that align with best security practices and regulatory frameworks are the best methods to address people, technologies, and facilities to provide actionable cybersecurity strategies. One such framework, which has garnered significant attention due to its complexity and transformative nature, is the Cybersecurity Capability Maturity

Archives

Go to Top