Skip to the main content.
100060 - Blog Graphics v2 100060 - Blog Graphics v22 100060 - Blog Graphics v23-png 100060 - Blog Graphics v24-png

Ahmet Payaslioglu

Threat Researcher

Latest Posts

2 min read

2FA in Cybersecurity-Setup Challenges

Protecting access to sensitive data and systems is mission-critical for organizations of all sizes. As cyber threats...
2 min read

How Threat Hunting is the Ultimate SOC Approach

Threat hunting has emerged as the ultimate approach for Security Operations Centers (SOCs) to stay ahead of cyber...
2 min read

Introducing Binalyze MITRE ATT&CK Analyzer 6.3.0

We are pleased to announce the release of Binalyze MITRE ATT&CK Analyzer version 6.3.0! This latest update rolled out...
4 min read

What is Cyber Threat Intelligence?

Cyber threat intelligence involves collecting and interpreting real-world threat activity and information about malware...
3 min read

Threat Hunting with DRONE and MITRE ATT&CK Analyzer

We recently updated Binalyze AIR MITRE ATT&CK Analyzer to version 5.7.0. This update brings significant enhancements to...
1 min read

Detect Exploitation Attempts on Linux Systems: Unpacking CVE-2024-1086

The recent identification of a significant exploit, CVE-2024-1086, which targets Linux systems for local privilege...
2 min read

Proactive Forensics Against CVE-2024-3094

Counter new and emerging threats with Binalyze AIR The discovery of CVE-2024-3094 within XZ Utils versions 5.6.0 and...
8 min read

Enhancing Threat Detection and Analysis during Investigations

In today's rapidly evolving threat landscape, organizations and MSSPs face growing numbers of cyber adversaries,...
2 min read

Uncovering the IOCs: Ivanti Connect Secure VPN Exploitation

In the ever-evolving landscape of cybersecurity, the recent exploitation of Ivanti Connect Secure VPN stands out as a...
4 min read

Dynamo Analyzer: When YARA isn’t enough!

Last updated: 21st June 2024 In a landscape where rapid and precise threat detection across assets in your IT estates...
9 min read

Investigating a malware attack using Binalyze AIR’s Investigation Hub

Updated: 6th June 2024 Navigating through a common incident use case. From the shadowed corners of cyberspace, a...
4 min read

Focus investigations with MITRE ATT&CK insights

Last updated: 29th May 2024 Integrate automated evidence analysis and mapping into your investigations Understanding an...
11 min read

How To perform Compromise Assessment with DRONE

Updated: 14th June 2024 Immediately identify and focus on the most critical areas for further investigation DRONE is...
4 min read

Offline collection with AIR

The reality of modern incident response is that it’s not always possible to remotely connect with every one of your...
5 min read

The power of Auto Asset Tagging in DFIR

When a breach occurs one of the first questions the investigating team leader will want answered is, ‘how many of our...
2 min read

The OneNote malware attack – A retrospective

At Binalyze we’re always actively monitoring for the latest exploits and attack vectors. We’re also in constant...
3 min read

MITRE ATT&CK scanning and mapping added to DRONE

The DFIR Lab team at Binalyze have their finger on the pulse of the cybersecurity ecosystem to ensure that our DRONE...
5 min read

Protect your chain of custody with content hashing and timestamping

The awareness and practice of digital forensics has been with us for over 40 years and although often seen as a...

Get the latest news & updates

on automated investigations and incident response

Drop your email to never miss an update.date.