New Threat Research: Uncovering Adversarial LDAP Tradecraft

Read Threat Research

Search

Threat Hunting

Reduce blind spots and counter evasive threats with hypothesis-based Threat Hunting

man looking at his cybersecurity app on the phone
Security Lock for IT

Hypothesis-Based Threat Hunting
From Binary Defense Can Help You

Find stealthy attacks that can’t be found with AI tools or common security approaches

Identify misconfigurations and potential weaknesses

Create new detection rules based on threat hunting results

Improve your security posture by implementing recommendations on your security architecture, instrumentation, and controls

Strengthen Your Defenses

By clicking “Request Information,” you agree to our Terms & Conditions and Privacy Policy.

How Threat Hunting Works

1. Research emerging attacker techniques and tools
2. Evaluate current security platforms and event logs
3. Find misconfigurations, network anomalies and gaps in coverage
4. Notify client where gaps exist to strengthen posture
5. Write new detection rules and adds to security configuration
6. Test new attacker techniques and detection methods in a laboratory environment
7. Reverse engineer malware to learn the attacker's methods
8. Repeat, repeat, repeat!

With Binary Defense Threat Hunting, we have skilled, experienced threat hunters watching and creating new detections for our environment at all times. We wouldn’t be able to afford that level of talent at an Energy Company of our size. They feel like they are an extension of our team.

Senior Security Engineer, Energy Company

Threat actors are constantly evolving and updating their techniques to get past organization’s defenses. Our threat hunting team learns what is normal in your environment over time, finds unique patterns in your logs, links associated events, and traces patterns to discover anomalies and security gaps. 

When a potential threat is confirmed, we notify your team, analyze the root cause, perform advanced malware analysis, and provide additional context to help you focus on incident response. We also write new detection rules to improve your ability to stay ahead of the attackers.

Our Threat Hunting Team

It takes a unique skillset to become a threat hunter. That's why we’ve assembled an expert team with deep technical experience and capabilities.

Trained Threat Hunters

Expert analysts with advanced malware analysis and security investigation skills

Use threat intelligence, intuition and experience to discover anomalies and develop patterns of threat activity over time to identify hidden threats

Provide detailed and actionable guidance on next steps to respond to a threat for seamless integration with incident response

100% US-based hunters

Areas of Expertise

Adversarial research & modeling

Hunts customized to client enterprise & business

Proactive validation across client environments

Malware reverse engineering

Feedback loop into detection engineering

Adds context from vulnerability/exploit research

Dedicated human analysis

Technologies we work with

Our Threat Hunters are experienced in working with the following solutions:

micro defender
backstory
splunk
Footer Chronicle Logo
Microsoft Azure Sentinel White 1
Microsoft 365 logo copy
carbonBlack

Subscribe to Threat Watch

Timely threat Intelligence news feed

recommendations from our intelligence specialists to help protect your company from the latest threats

Searchable archive of past news and analysis

Get the latest cybersecurity news and insights in your inbox daily.