| Solving Intractable Performance Problems Through Vertical Engineering |
AlexI |
Dec 02, 2019 |
3325 |
- |
| Step into the AI-Native SOC: Discover Next-Gen SIEM at Fal.Con 2024 |
- |
Dec 02, 2019 |
1876 |
- |
| CrowdStrike Tailors Adversary Intelligence to Customer Environments |
Industry |
Dec 02, 2019 |
1735 |
- |
| Mind the MPLog: Leveraging Microsoft Protection Logging for Forensic Investigations |
Windows Defender |
Dec 02, 2019 |
2045 |
- |
| Why the Detection Funnel Hits Diminishing Returns |
- |
Dec 02, 2019 |
2490 |
- |
| Who is FANCY BEAR (APT28)? |
- |
Dec 02, 2019 |
1473 |
- |
| CrowdStrike Named a Leader with a “Stellar” MDR Offering in The Forrester Wave™: Managed Detection and Response Services in Europe, Q4 2023 |
- |
Dec 02, 2019 |
1892 |
- |
| New York State Cybersecurity Regulations for Financial Institutions are Tough, Critical, and Reach Beyond State Borders |
August |
Dec 02, 2019 |
2653 |
- |
| Mapping It Out: Analyzing the Security of eBPF Maps |
- |
Dec 02, 2019 |
2457 |
- |
| Can't Protect Your Data from Ransomware? Think Again. |
- |
Dec 02, 2019 |
1915 |
- |
| The Economics of Ransomware: How SCADA/ICS Changes the Equation |
- |
Dec 02, 2019 |
2254 |
- |
| Check for Vulnerability Exposure to CVE-2021-3156 (Baron Samedit) with Falcon Spotlight |
- |
Dec 02, 2019 |
1591 |
- |
| CrowdStrike Strengthens Exploit Protection Using Intel CPU Telemetry |
Intel |
Dec 02, 2019 |
4727 |
- |
| HijackLoader Expands Techniques to Improve Defense Evasion |
HijackLoader |
Dec 02, 2019 |
3741 |
- |
| CrowdStrike Tops IDC Worldwide Corporate Endpoint Security Market Shares, 2021 |
IDC |
Dec 02, 2019 |
2374 |
- |
| The Human Element of Detection and Response |
MITRE |
Dec 02, 2019 |
2405 |
- |
| Using Artificial Intelligence and Machine Learning to Combat Hands-on-Keyboard Cybersecurity Attacks |
- |
Dec 02, 2019 |
2180 |
- |
| Brian Kelly, CSO of Rackspace, Shares Why He Chose CrowdStrike |
- |
Dec 02, 2019 |
1265 |
- |
| Visibility and Granular Control: The Secret to Securing USB Devices In the Workplace |
- |
Dec 02, 2019 |
2086 |
- |
| GDPR at Three Years: Risk Takes On New Meaning |
- |
Dec 02, 2019 |
2068 |
- |
| Beefing up the Sandbox (and More): Signature Chaining to Pinpoint More Malware Behaviors |
- |
Dec 02, 2019 |
3044 |
- |
| Hypervisor Jackpotting, Part 3: Lack of Antivirus Support Opens the Door to Adversary Attacks |
CrowdStrike Intelligence |
Dec 02, 2019 |
3713 |
- |
| Automating Remote Remediation of TrickBot via Falcon’s Real Time Response API: Part 2 |
- |
Dec 02, 2019 |
3687 |
- |
| Adversary Quest 2022 Walkthrough, Part 3: Four PROTECTIVE PENGUIN Challenges |
PROTECTIVE PENGUIN |
Dec 02, 2019 |
5362 |
- |
| CrowdStrike Enables Federal Departments and Agencies to Meet CISA Operational Directive 23-01 |
- |
Dec 02, 2019 |
2886 |
- |
| The Windows Restart Manager: How It Works and How It Can Be Hijacked, Part 2 |
RmGetList |
Dec 02, 2019 |
4635 |
- |
| Unraveling the Spiderweb: Timelining ATT&CK Artifacts Used by GRIM SPIDER |
GRIM SPIDER
May |
Dec 02, 2019 |
2631 |
- |
| We Stop. So You Can Go. |
CrowdStrike |
Dec 02, 2019 |
2150 |
- |
| CrowdStrike Demystifies Threats with MITRE ATT&CK |
Falcon |
Dec 02, 2019 |
1731 |
- |
| Explore the Adversary Universe |
- |
Dec 02, 2019 |
1593 |
- |
| Why Customers Are Consolidating Cybersecurity with CrowdStrike |
- |
Dec 02, 2019 |
2319 |
- |
| CrowdStrike Announces Expanded Partnership at AWS re:Invent 2021 |
Booth |
Dec 02, 2019 |
2281 |
- |
| CrowdStrike Detects and Blocks Initial SharePoint Zero-Day Exploitation |
- |
Dec 02, 2019 |
2277 |
- |
| CrowdStrike Discovers Vulnerability in Flexera's FlexNet Inventory Agent (CVE-2023-29082) |
Flexera |
Dec 02, 2019 |
2053 |
- |
| Where Do CISOs Belong in the IT Org Chart? |
- |
Dec 02, 2019 |
1923 |
- |
| How CrowdStrike Protects Customers from Threats Delivered via Log4Shell |
CrowdStrike Falcon |
Dec 02, 2019 |
2502 |
- |
| March 2024 Patch Tuesday: Two Critical Bugs Among 60 Vulnerabilities Patched |
Extended Security Update |
Dec 02, 2019 |
1752 |
- |
| Asia Pacific and Japan Survey Reveals the Future Expectations of Cybersecurity in the Wake of COVID-19 |
- |
Dec 02, 2019 |
2175 |
- |
| Big Game Hunting TTPs Continue to Shift After DarkSide Pipeline Attack |
DOPPEL SPIDER |
Dec 02, 2019 |
2366 |
- |
| Nowhere to Hide: Protecting a Telecommunications Company from Targeted Attacks |
CrowdStrike Intelligence |
Dec 02, 2019 |
2222 |
- |
| Your Jenkins Belongs to Us Now: Abusing Continuous Integration Systems |
- |
Dec 02, 2019 |
2877 |
- |
| CrowdStrike Falcon Prevents Supply Chain Attack Involving Compromised NPM Packages |
IOAs
As |
Dec 02, 2019 |
1724 |
- |
| 3 Critical Steps for Application Security Teams in 2024 |
- |
Dec 02, 2019 |
2266 |
- |
| CrowdStrike Wins Frost & Sullivan 2024 Cloud Leadership Award |
CrowdStrike |
Dec 02, 2019 |
1835 |
- |
| Meet CrowdStrike's Adversary of the Month for February: MUMMY SPIDER |
AdamM |
Dec 02, 2019 |
1414 |
- |
| How to Detect Zerologon Attacks in Your Windows Infrastructure |
Zerologon |
Dec 02, 2019 |
1512 |
- |
| AI vs. AI: The Race Between Adversarial and Defensive Intelligence |
- |
Dec 02, 2019 |
3932 |
- |
| UAL Thank Us Later: Leveraging User Access Logging for Forensic Investigations |
Microsoft |
Dec 02, 2019 |
4426 |
- |
| 4 Ways Adversaries Hijack DLLs — and How CrowdStrike Falcon OverWatch Fights Back |
Moving |
Dec 02, 2019 |
3051 |
- |
| Credentials, Authentications and Hygiene: Supercharging Incident Response with Falcon Identity Threat Detection |
Falcon ITD |
Dec 02, 2019 |
2430 |
- |
| Technical Details: Falcon Content Update for Windows Hosts |
CrowdStrike |
Dec 02, 2019 |
1628 |
- |
| Access Brokers: Who Are the Targets, and What Are They Worth? |
- |
Dec 02, 2019 |
2150 |
- |
| Spotlight on the Log-Structured Merge (LSM) Tree: One of the Keys Enabling CrowdStrike to Process Trillions of Events per Day |
- |
Dec 02, 2019 |
3000 |
- |
| Tech Analysis: CrowdStrike's Kernel Access and Security Architecture |
Microsoft |
Dec 02, 2019 |
3094 |
- |
| CrowdStrike Next-Gen SIEM Innovations Slash Response Time and Simplify SIEM Migrations |
- |
Dec 02, 2019 |
2378 |
- |
| Modern Infrastructure Requires Modern Cloud Security |
- |
Dec 02, 2019 |
1984 |
- |
| MURKY PANDA: A Trusted-Relationship Threat in the Cloud |
MURKY PANDA |
Dec 02, 2019 |
2859 |
- |
| CrowdStrike Investors Double Down and Lead $100 Million Series D Round to Support the Company’s Global Growth |
Accel |
Dec 02, 2019 |
1916 |
- |
| Hardening Neural Networks for Computer Security Against Adversarial Attack |
- |
Dec 02, 2019 |
3040 |
- |
| 2020 Global Security Attitude Survey: How Organizations Fear Cyberattacks Will Impact Their Digital Transformation and Future Growth |
- |
Dec 02, 2019 |
2653 |
- |
| CrowdStrike Strengthens Its Cybersecurity Alliances Ecosystem in the Battle Against Advanced Threats |
Falcon |
Dec 02, 2019 |
2503 |
- |
| AI Innovation in the Spotlight at Fal.Con 2024 |
NVIDIA |
Dec 02, 2019 |
1985 |
- |
| The Critical Role of Cybersecurity in M&A: Part 1, Due Diligence |
- |
Dec 02, 2019 |
2491 |
- |
| CrowdStrike Services Observes SCATTERED SPIDER Escalate Attacks Across Industries |
CrowdStrike Services |
Dec 02, 2019 |
2628 |
- |
| A Roadmap to Cybersecurity Maturity, Part 1: Am I Breached? |
- |
Dec 02, 2019 |
1960 |
- |
| Executive Viewpoint |
OLD |
Dec 02, 2019 |
9529 |
- |
| ADP Trusts CrowdStrike Falcon® to Protect Payrolls and Workers Around the World |
- |
Dec 02, 2019 |
1577 |
- |
| Grafana Alerting in a Multi-cloud World |
Grafana |
Dec 02, 2019 |
2537 |
- |
| The Imperative to Secure Identities: Key Takeaways from Recent High-Profile Breaches |
- |
Dec 02, 2019 |
2032 |
- |
| CrowdStrike Announces Expanded Service Integrations with AWS |
AWS CloudTrail |
Dec 02, 2019 |
2164 |
- |
| Managing Dead Letter Messages: Three Best Practices to Effectively Capture, Investigate and Redrive Failed Messages |
- |
Dec 02, 2019 |
2187 |
- |
| Response When Minutes Matter: Rising Up Against Ransomware |
Falcon OverWatch |
Dec 02, 2019 |
3143 |
- |
| Operators of SamSam Continue to Receive Significant Ransom Payments |
CrowdStrike Falcon |
Dec 02, 2019 |
2183 |
- |
| CrowdStrike Named a Leader in the 2025 IDC MarketScape for CNAPP |
Leading Organizations
Today |
Dec 02, 2019 |
1895 |
- |
| CrowdStrike Store’s New Dragos App Provides Early Visibility of OT Threats Across IT Environments |
CrowdStrike |
Dec 02, 2019 |
1977 |
- |
| Securing Elections Globally: How CrowdStrike Is Helping |
- |
Dec 02, 2019 |
2232 |
- |
| CrowdStrike Announces Integration with ChatGPT Enterprise Compliance API |
- |
Dec 02, 2019 |
1795 |
- |
| How to Secure Business-Critical Applications |
- |
Dec 02, 2019 |
2629 |
- |
| Two Sides of the Same Coin: Protecting Data in the Cloud Is a Shared Responsibility |
- |
Dec 02, 2019 |
1978 |
- |
| Native Java Bytecode Debugging without Source Code |
CrowdStrike |
Dec 02, 2019 |
1826 |
- |
| Hunting pwnkit Local Privilege Escalation in Linux (CVE-2021-4034) |
Red Hat |
Dec 02, 2019 |
1872 |
- |
| Falcon Fund in Focus: Nagomi Helps Customers Maximize Their Cybersecurity Investments |
Nagomi |
Dec 02, 2019 |
1673 |
- |
| February 2021 Patch Tuesday: Updates for Zerologon and Notable CVE-2021-1732 |
Microsoft |
Dec 02, 2019 |
1904 |
- |
| Ransomware Increases the Back-to-School Blues |
AdamM |
Dec 02, 2019 |
1865 |
- |
| 3 Ways Visualization Improves Cloud Asset Management and Security |
- |
Dec 02, 2019 |
2027 |
- |
| Operational threat intelligence with Maltego Transform Hub |
AdamM |
Dec 02, 2019 |
1384 |
- |
| Behind the Curtain: Falcon OverWatch Hunting Leads Explained |
CrowdStrike |
Dec 02, 2019 |
2584 |
- |
| WIZARD SPIDER Update: Resilient, Reactive and Resolute |
WIZARD SPIDER |
Dec 02, 2019 |
2773 |
- |
| Falcon Platform Identity Protection Shuts Down MITRE ATT&CK Adversaries |
- |
Dec 02, 2019 |
2127 |
- |
| AI & Machine Learning |
- |
Dec 02, 2019 |
2799 |
- |
| Mimikatz in the Wild: Bypassing Signature-Based Detections Using the “AK47 of Cyber” |
CrowdStrike Co |
Dec 02, 2019 |
1706 |
- |
| A Tale of Two RSA Conferences |
RSA Conference |
Dec 02, 2019 |
2372 |
- |
| CrowdStrike Researchers Develop Custom XGBoost Objective to Improve ML Model Release Stability |
- |
Dec 02, 2019 |
3513 |
- |
| CrowdStrike Named A “Strong Performer” in the Forrester New Wave for XDR Providers |
- |
Dec 02, 2019 |
1750 |
- |
| How Falcon OverWatch Investigates Malicious Self-Extracting Archives, Decoy Files and Their Hidden Payloads |
Falcon OverWatch Elite |
Dec 02, 2019 |
2799 |
- |
| Mo' Shells Mo' Problems - Network Detection |
- |
Dec 02, 2019 |
3121 |
- |
| CrowdStrike Expands Falcon Data Replicator Capabilities to Boost SOC Performance |
- |
Dec 02, 2019 |
1803 |
- |
| Securing Our Nation: How the Infrastructure Investment and Jobs Act Delivers on Cyber Resiliency |
Building Your Security Stack |
Dec 02, 2019 |
2603 |
- |
| Meet CrowdStrike’s Adversary of the Month for June: MUSTANG PANDA |
- |
Dec 02, 2019 |
1527 |
- |
| Why Your Small Business Needs to Rethink Its Cybersecurity Strategy |
- |
Dec 02, 2019 |
1893 |
- |
| February 2023 Patch Tuesday: 9 Critical CVEs, and 3 Zero Days Being Actively Exploited in the Wild |
Elevation |
Dec 02, 2019 |
2344 |
- |
| Shlayer Malvertising Campaigns Still Using Flash Update Disguise |
Shlayer |
Dec 02, 2019 |
2662 |
- |
| CrowdStrike Named a Leader in The Forrester Wave™: Cybersecurity Incident Response Services, Q1 2022 |
- |
Dec 02, 2019 |
2301 |
- |
| The Evolution of Protected Processes Part 2: Exploit/Jailbreak Mitigations, Unkillable Processes and Protected Services |
AlexI |
Dec 02, 2019 |
1237 |
- |
| CrowdStrike and AWS Expand Partnership to Offer Customers DevOps-Ready Security |
Amazon GuardDuty |
Dec 02, 2019 |
2376 |
- |
| Meet CrowdStrike’s Adversary of the Month for April: STARDUST CHOLLIMA |
AdamM |
Dec 02, 2019 |
1626 |
- |
| Taking Security to the Next Level: CrowdStrike Now Analyzes over 100 Billion Events Per Day |
CrowdStrike |
Dec 02, 2019 |
2001 |
- |
| The Anatomy of Wiper Malware, Part 1: Common Techniques |
Falcon |
Dec 02, 2019 |
3717 |
- |
| Security Doesn’t Stop at the First Alert: CrowdStrike Falcon Intelligence Offers New Context in MITRE ATT&CK Evaluation |
MITRE Engenuity |
Dec 02, 2019 |
2325 |
- |
| How Humio’s Index-free Architecture Reduces Log Management Costs |
- |
Dec 02, 2019 |
1989 |
- |
| CrowdStrike Uncovers New MacOS Browser Hijacking Campaign |
- |
Dec 02, 2019 |
3296 |
- |
| Evicting Typosquatters: How CrowdStrike Protects Against Domain Impersonations |
- |
Dec 02, 2019 |
1720 |
- |
| Featured Articles |
- |
Dec 02, 2019 |
1535 |
- |
| A More Modern Approach to Logging in Go |
Uber |
Dec 02, 2019 |
2475 |
- |
| Best Practices: Improving Fault-Tolerance in Apache Kafka Consumer |
Confluent |
Dec 02, 2019 |
3099 |
- |
| BERT Embeddings: A Modern Machine-learning Approach for Detecting Malware from Command Lines (Part 1 of 2) |
COPOD |
Dec 02, 2019 |
2742 |
- |
| PINCHY SPIDER Affiliates Adopt “Big Game Hunting” Tactics to Distribute GandCrab Ransomware |
PINCHY SPIDER |
Dec 02, 2019 |
2120 |
- |
| Dark Reading: CrowdStrike’s Adam Meyers on eCrime Actors’ Pivot to Ransomware |
CrowdStrike VP |
Dec 02, 2019 |
1474 |
- |
| Data Protection Day 2024: As Technology and Threats Evolve, Data Protection Is Paramount |
- |
Dec 02, 2019 |
2159 |
- |
| Everything You Need to Know About Securing Containers With Falcon |
Falcon Cloud Workload Protection |
Dec 02, 2019 |
2389 |
- |
| Out of Sight, Out of Mind: Why EASM Is the Foundation of Zero Trust Architecture |
EASM |
Dec 02, 2019 |
2027 |
- |
| SANS Institute Reviews CrowdStrike Falcon® Endpoint Protection |
- |
Dec 02, 2019 |
1843 |
- |
| HIMSS and Beyond: What’s Next in Healthcare Security |
- |
Dec 02, 2019 |
2093 |
- |
| Noise Is the Problem — CrowdScore Is the Solution |
CrowdScore |
Dec 02, 2019 |
2215 |
- |
| Malware Analysis: GuLoader Dissection Reveals New Anti-Analysis Techniques and Code Injection Redundancy |
CrowdStrike |
Dec 02, 2019 |
3577 |
- |
| Modernize Log Monitoring to Accelerate Digital Transformation |
- |
Dec 02, 2019 |
1906 |
- |
| CrowdStrike Foundation Supports Next Generation of Talent in Cybersecurity |
- |
Dec 02, 2019 |
1476 |
- |
| Why XDR Must Start with EDR: Join the Discussion with CrowdStrike and Guest Forrester Research |
- |
Dec 02, 2019 |
1747 |
- |
| Software Supply Chain Attacks on the Rise, Undermining Customer Trust |
AdamM |
Dec 02, 2019 |
1860 |
- |
| Nowhere to Hide: Detecting a Vishing Intrusion at a Retail Company |
OverWatch |
Dec 02, 2019 |
1818 |
- |
| The Importance of Integrated Endpoint and Workload Protection for IT and Security Operations |
CrowdStrike |
Dec 02, 2019 |
2392 |
- |
| Movin’ Out: Identifying Data Exfiltration in MOVEit Transfer Investigations |
Username |
Dec 02, 2019 |
2231 |
- |
| CrowdStrike to Acquire Onum to Transform How Data Powers the Agentic SOC |
- |
Dec 02, 2019 |
2092 |
- |
| From Data to Deployment: How Human Expertise Maximizes Detection Efficacy Across the Machine Learning Lifecycle |
Joel Spurlock |
Dec 02, 2019 |
2813 |
- |
| Sneak Peek: 2020 Fal.Con for Public Sector Virtual Cybersecurity Conference |
- |
Dec 02, 2019 |
2663 |
- |
| The Hoot Podcast (Episode 35): Humio at Bloomreach with Junaid Sheriff |
- |
Dec 02, 2019 |
1457 |
- |
| Meet CrowdStrike’s Adversary of the Month for November: HELIX KITTEN |
AdamM |
Dec 02, 2019 |
1576 |
- |
| CrowdStrike Announces 2022 Partners of the Year at Fal.Con |
Deloitte |
Dec 02, 2019 |
2537 |
- |
| Shift Left Security: The Magic Elixir for Securing Cloud-Native Apps |
- |
Dec 02, 2019 |
1824 |
- |
| How We Use Apache Airflow at CrowdStrike, Part 1 |
- |
Dec 02, 2019 |
3332 |
- |
| CrowdStrike Delivers Cyber Resilience for the Airline Industry to Meet New TSA Requirements |
TSA |
Dec 02, 2019 |
2626 |
- |
| Microsoft Active Directory Supply Chain Compromise Reflects Shifting Adversary Tactics to Exploit Identity |
- |
Dec 02, 2019 |
2021 |
- |
| CrowdStrike Named a Leader in Risk-Based Vulnerability Management by IDC MarketScape |
IDC MarketScape
November |
Dec 02, 2019 |
2233 |
- |
| On-Demand Webcast Discusses “Making 60-Minute Remediation a Reality” |
CrowdStrike |
Dec 02, 2019 |
2540 |
- |
| INDRIK SPIDER Supersedes WastedLocker with Hades Ransomware to Circumvent OFAC Sanctions |
CrowdStrike Intelligence |
Dec 02, 2019 |
2252 |
- |
| Empower Your SOC with New Applications in the CrowdStrike Store |
NIST |
Dec 02, 2019 |
2312 |
- |
| Making Sense of the Dark Web with Falcon Intelligence Recon+ |
Industry
Figure |
Dec 02, 2019 |
2134 |
- |
| CrowdStrike Sets Highest Possible Standard in SE Labs Breach Response Test |
SE Labs |
Dec 02, 2019 |
1554 |
- |
| Communication Is Key to Keeping Remote Workers Safe and Secure |
CrowdStrike CTO Mike Sentonas |
Dec 02, 2019 |
1946 |
- |
| CrowdStrike Uncovers I2Pminer MacOS Mineware Variant |
- |
Dec 02, 2019 |
4805 |
- |
| Address the Cybersecurity Skills Shortage by Building Your Security Stack with the CrowdStrike Store |
Building Your Security Stack |
Dec 02, 2019 |
2144 |
- |
| CrowdStrike and Microsoft Unite to Harmonize Cyber Threat Attribution |
Microsoft |
Dec 02, 2019 |
1863 |
- |
| Adversaries Set Their Sights on Oil and Gas Sector |
AdamM |
Dec 02, 2019 |
1923 |
- |
| New CrowdStrike Report Reveals Organizations’ Attitudes Toward Cybersecurity Readiness |
- |
Dec 02, 2019 |
2672 |
- |
| Forrester Names CrowdStrike a Leader in the 2020 Wave for Enterprise Detection And Response |
- |
Dec 02, 2019 |
1972 |
- |
| CrowdStrike and Intel Research Collaborate to Advance Endpoint Security Through AI and NPU Acceleration |
Paul Carlson |
Dec 02, 2019 |
2513 |
- |
| CrowdStrike Falcon® Enhances Fileless Attack Detection with Intel Accelerated Memory Scanning Feature |
Script Control |
Dec 02, 2019 |
2739 |
- |
| Meet CrowdStrike’s Adversary of the Month for August: GOBLIN PANDA |
AdamM |
Dec 02, 2019 |
1497 |
- |
| Hiding in Plain Sight: Remediating “Hidden” Malware with Real Time Response |
Russian |
Dec 02, 2019 |
2998 |
- |
| CrowdStrike Falcon Platform Detects and Prevents Active Intrusion Campaign Targeting 3CXDesktopApp Customers |
CrowdStrike |
Dec 02, 2019 |
2147 |
- |
| Discovering and Blocking a Zero-Day Exploit with CrowdStrike Falcon Complete: The Case of CVE-2023-36874 |
- |
Dec 02, 2019 |
2264 |
- |
| Why XDR Should Be on Your Roadmap for SOC Success |
ESG |
Dec 02, 2019 |
1880 |
- |
| CrowdStrike Falcon® Spotlight Fuses Endpoint Data with CISA's Known Exploited Vulnerabilities Catalog |
Falcon Spotlight |
Dec 02, 2019 |
3097 |
- |
| Announcing CrowdTour: Bringing the Power of the Crowd to a City Near You |
- |
Dec 02, 2019 |
1763 |
- |
| Sneak Peek: CrowdStrike at RSA Conference 2021 |
- |
Dec 02, 2019 |
2130 |
- |
| Best practices for Mobile Device Security |
- |
Dec 02, 2019 |
1867 |
- |
| Leading Global Brands Secure Themselves with CrowdStrike |
Supratim Adhikari |
Dec 02, 2019 |
2033 |
- |
| CrowdStrike Named a Leader with “Exceptional” MDR Service: 2023 Forrester Wave for MDR |
IDC |
Dec 02, 2019 |
1951 |
- |
| “You Want Me to Do What?” A Guide to Interpreting Cybersecurity Recommendations |
- |
Dec 02, 2019 |
2491 |
- |
| Hidden Administrative Accounts: BloodHound to the Rescue |
Will Schroeder |
Dec 02, 2019 |
2634 |
- |
| CrowdStrike Named a Leader in the 2025 GigaOm SIEM Radar Report |
CrowdStrike |
Dec 02, 2019 |
2112 |
- |
| PROPHET SPIDER Exploits Citrix ShareFile Remote Code Execution Vulnerability CVE-2021-22941 to Deliver Webshell |
- |
Dec 02, 2019 |
1955 |
- |
| Small Business, Big Defense: Four Pillars of an Effective Cybersecurity Awareness Program |
- |
Dec 02, 2019 |
2119 |
- |
| What the New AV-Comparatives’ Approved Business Security Product Award Means for CrowdStrike Falcon® |
- |
Dec 02, 2019 |
1947 |
- |
| CrowdStrike Advances the Use of AI to Predict Adversary Behavior and Significantly Improve Protection |
CrowdStrike |
Dec 02, 2019 |
2252 |
- |
| CrowdStrike Falcon® Dominance Evident in MITRE ATT&CK Evaluation With 100% Detection Across All 19 Attack Phases |
MITRE |
Dec 02, 2019 |
3156 |
- |
| Launching the CrowdStrike Store to Bring Trusted Third-Party Apps to the Falcon Platform |
CrowdStrike |
Dec 02, 2019 |
1948 |
- |
| Gartner Peer Insights “Voice of the Customer” for Endpoint Protection Platforms Speaks Volumes for CrowdStrike |
Gartner |
Dec 02, 2019 |
1823 |
- |
| How Humio Index-free Log Management Searches 1 PB in Under a Second |
- |
Dec 02, 2019 |
1664 |
- |
| Who is EMBER BEAR? |
Main Directorate |
Dec 02, 2019 |
1615 |
- |
| Falcon Complete and CrowdStrike Adversary Emulation Pen Testing Recognized as “Cyber Catalysts” in Marsh Cyber Risk Evaluation |
- |
Dec 02, 2019 |
1993 |
- |
| CrowdStrike Ranked #1 in 2025 Frost Radar™ for MDR |
- |
Dec 02, 2019 |
1694 |
- |
| Re-searching Hyperparameters for Training Boosted Tree Models |
TreeInstance SubsampleRound |
Dec 02, 2019 |
2057 |
- |
| Defense Is Still the Best Offense: Why Continuous Vulnerability Management Is Essential |
CrowdStrike |
Dec 02, 2019 |
2427 |
- |
| Teaching an Old Dog New Tricks: 2017 Magniber Ransomware Uses PrintNightmare Vulnerability to Infect Victims in South Korea |
Microsoft |
Dec 02, 2019 |
2442 |
- |
| What’s in Your Wallet? Resource-Draining Cryptojacking Attacks Are on the Rise |
CrowdStrike |
Dec 02, 2019 |
2240 |
- |
| CrowdStrike CEO Addresses Coronavirus Cybersecurity Impact |
CrowdStrike CTO Mike Sentonas |
Dec 02, 2019 |
1957 |
- |
| CrowdStrike Named a Leader and Fast Mover in GigaOm ISPM Radar |
GigaOm |
Dec 02, 2019 |
1833 |
- |
| September 2023 Patch Tuesday: Two Actively Exploited Zero-Days and Five Critical Vulnerabilities Addressed |
Developer Tools |
Dec 02, 2019 |
2085 |
- |
| Fal.Con 2020: Going Beyond Today’s Typical Virtual Event |
- |
Dec 02, 2019 |
1729 |
- |
| Adversary Quest 2022 Walkthrough, Part 1: Four CATAPULT SPIDER Challenges |
CATAPULT SPIDER |
Dec 02, 2019 |
6977 |
- |
| Protecting Cloud Workloads with CrowdStrike and AWS |
CrowdStrike |
Dec 02, 2019 |
2644 |
- |
| CrowdStrike to Acquire Reposify to Reduce Risk Across the External Attack Surface and Fortify Customer Security Postures |
- |
Dec 02, 2019 |
2148 |
- |
| Manufacturing Industry in the Adversaries’ Crosshairs |
OverWatch |
Dec 02, 2019 |
3574 |
- |
| Closing the Cloud Security Skills Gap: MDR for the Cloud |
CrowdStrike |
Dec 02, 2019 |
2071 |
- |
| Who is Samurai Panda |
AdamM |
Dec 02, 2019 |
1812 |
- |
| Address Zero-Day Threats Long Before an Attack Occurs |
- |
Dec 02, 2019 |
1755 |
- |
| Securing the Mac-Based Organization |
IBM |
Dec 02, 2019 |
1808 |
- |
| Defense Against the Lateral Arts: Detecting and Preventing Impacket’s Wmiexec |
Impacket |
Dec 02, 2019 |
4054 |
- |
| The Importance of Logs |
- |
Dec 02, 2019 |
1960 |
- |
| A Tale of Two Cookies: How to Pwn2Own the Cisco RV340 Router |
- |
Dec 02, 2019 |
3799 |
- |
| Which Way Did She Go? Speeding Up Lateral Movement Investigations |
- |
Dec 02, 2019 |
2140 |
- |
| Safeguarding K-12 Education: A Whole-of-State Approach to Cybersecurity for Chromebook-Centric School Districts |
ChromeOS |
Dec 02, 2019 |
2216 |
- |
| New Gartner Report Redefines Endpoint Protection for 2018 |
Gartner |
Dec 02, 2019 |
1835 |
- |
| CrowdStrike Falcon Named the Winner of the 2022 AV-TEST Award for Best MacOS Security Product |
- |
Dec 02, 2019 |
2106 |
- |
| Using Docker to Do Machine Learning at Scale |
- |
Dec 02, 2019 |
2167 |
- |
| CrowdStrike Is Proud to Sponsor the Mac Admins Foundation |
- |
Dec 02, 2019 |
1836 |
- |
| 5 Best Practices to Secure Azure Resources |
Russian |
Dec 02, 2019 |
3086 |
- |
| Bear Hunting: Tracking Down COZY BEAR Backdoors |
Convert |
Dec 02, 2019 |
1928 |
- |
| U.S. - China Cyber Agreement: Trust, but Verify |
- |
Dec 02, 2019 |
1672 |
- |
| The ICS/OT Landscape: How CrowdStrike Supports Through Partnerships With Rockwell and Others |
Ekans |
Dec 02, 2019 |
2563 |
- |
| May 2021 Patch Tuesday: Prioritize Critical Remote Code Execution and New Wormable CVEs |
Microsoft |
Dec 02, 2019 |
2124 |
- |
| Sharding Kafka for Increased Scale and Reliability |
Sharding Kafka |
Dec 02, 2019 |
2200 |
- |
| New Docker Cryptojacking Attempts Detected Over 2021 End-of-Year Holidays |
Palo Alto |
Dec 02, 2019 |
3235 |
- |
| Falcon Cloud Security Supports GKE Autopilot to Secure More GCP Workloads |
Google Cloud Platform |
Dec 02, 2019 |
1760 |
- |
| Podcast: CrowdStrike CTO Michael Sentonas Shares His Thoughts on Humio and how CrowdStrike is Addressing the Complexity of the Threat Landscape |
- |
Dec 02, 2019 |
1338 |
- |
| The Anatomy of an ALPHA SPIDER Ransomware Attack |
CrowdStrike Counter Adversary Operations |
Dec 02, 2019 |
3226 |
- |
| Preventing Sophisticated Attacks: Tips From a Real-World Incident Responder |
Brendon |
Dec 02, 2019 |
2147 |
- |
| The Force Multiplier of Correlating Your Security Telemetry |
- |
Dec 02, 2019 |
2088 |
- |
| Beyond Compliance: Secure Your Business in the Cloud with Falcon Cloud Security |
MITRE ATT |
Dec 02, 2019 |
2058 |
- |
| One Size Does Not Fit All: Flexible Response Capabilities Matter |
- |
Dec 02, 2019 |
1711 |
- |
| CrowdStrike Identifies New Kiss-a-Dog Cryptojacking Campaign Targeting Vulnerable Docker and Kubernetes Infrastructure |
CrowdStrike |
Dec 02, 2019 |
2963 |
- |
| CrowdStrike Enhances Falcon Discover to Reduce the Attack Surface, Streamline Operations and Lower Costs |
Falcon Spotlight |
Dec 02, 2019 |
2043 |
- |
| GitOps and Shift Left Security: The Changing Landscape of DevSecOps |
- |
Dec 02, 2019 |
2007 |
- |
| Key Findings from CrowdStrike’s 2024 State of Application Security Report |
- |
Dec 02, 2019 |
1888 |
- |
| Zero Trust Strengthens Data Protection to Achieve National Cyber Strategy Goals |
Executive Order |
Dec 02, 2019 |
2453 |
- |
| CrowdStrike Falcon® Supports New macOS Big Sur |
Apple |
Dec 02, 2019 |
1583 |
- |
| Many Paths, One Goal: Forging a Career in Cybersecurity |
- |
Dec 02, 2019 |
2266 |
- |
| Seeing Malware Through the Eyes of a Convolutional Neural Network |
Zeiler |
Dec 02, 2019 |
3598 |
- |
| Runtime Protection: The Secret Weapon for Stopping Breaches in the Cloud |
- |
Dec 02, 2019 |
2274 |
- |
| MITRE ATT&CK: Why Detections and Tainted Telemetry are Required for an Effective EDR Solution |
Falcon |
Dec 02, 2019 |
2373 |
- |
| CrowdStrike Cloud Security Extends to New Red Hat Enterprise Linux Versions |
- |
Dec 02, 2019 |
1840 |
- |
| CrowdStrike Named a Leader in 2025 Gartner® Magic Quadrant™ for Endpoint Protection Platforms for Sixth Consecutive Time |
Gartner |
Dec 02, 2019 |
2208 |
- |
| How to Defend Employees and Data as Social Engineering Evolves |
- |
Dec 02, 2019 |
2665 |
- |
| AutoMacTC: Automating Mac Forensic Triage |
Crowd Response |
Dec 02, 2019 |
2126 |
- |
| The Hoot Podcast (Episode 19): Humio with Miguel Adams, Government Agency Security Engineer |
- |
Dec 02, 2019 |
1318 |
- |
| Discovering the MOVEit Vulnerability with the CrowdStrike Falcon Platform |
FileName |
Dec 02, 2019 |
1687 |
- |
| CrowdStrike’s work with the Democratic National Committee: Setting the record straight |
Shawn Henry |
Dec 02, 2019 |
6691 |
- |
| VICEROY TIGER Delivers New Zero-Day Exploit |
AdamM |
Dec 02, 2019 |
1403 |
- |
| Healthcare Update: Next-Gen Solutions Protecting Endpoints From Today’s Attackers |
CrowdStrike Intelligence |
Dec 02, 2019 |
1539 |
- |
| Healthcare Is Experiencing a Cybersecurity Emergency |
Forbes |
Dec 02, 2019 |
2607 |
- |
| CrowdStrike Named a Leader in Forrester Wave for Cloud Workload Security |
- |
Dec 02, 2019 |
1981 |
- |
| Hardening Your Cloud Against SMTP Abuse |
AWS |
Dec 02, 2019 |
2335 |
- |
| Coming Soon to Las Vegas: Fal.Con 2022 Event Highlights and Special Guests |
- |
Dec 02, 2019 |
2202 |
- |
| New Report: Falcon OverWatch Threat Hunting Leaves Adversaries with Nowhere to Hide |
OverWatch |
Dec 02, 2019 |
1913 |
- |
| Falcon Sensor Content Issue from July 19, 2024, Likely Used to Target CrowdStrike Customers |
- |
Dec 02, 2019 |
1463 |
- |
| Malicious Inauthentic Falcon Crash Reporter Installer Distributed to German Entity via Spearphishing Website |
CrowdStrike |
Dec 02, 2019 |
2285 |
- |
| Early Bird Catches the Wormhole: Observations from the StellarParticle Campaign |
CrowdStrike |
Dec 02, 2019 |
7507 |
- |
| Preventing Container Escape Attempts with Falcon Cloud Security's Enhanced Runtime Capabilities |
- |
Dec 02, 2019 |
2730 |
- |
| BERT Embeddings: A Modern Machine-learning Approach for Detecting Malware from Command Lines (Part 2 of 2) |
Vaswani |
Dec 02, 2019 |
2701 |
- |
| New Partner Applications to Accelerate Your SOC’s Security Transformation |
Reducing Friction |
Dec 02, 2019 |
1849 |
- |
| CVE-2022-23648: Kubernetes Container Escape Using Containerd CRI Plugin and Mitigation |
Google |
Dec 02, 2019 |
1957 |
- |
| Increasing Relevance of Access Broker Market Shown in Improved ECX Model |
CrowdStrike Intelligence |
Dec 02, 2019 |
1900 |
- |
| Endpoint and Identity Security: A Critical Combination to Stop Modern Attacks |
- |
Dec 02, 2019 |
2355 |
- |
| CrowdStrike Services Releases AutoMacTC 1.2.0 |
- |
Dec 02, 2019 |
1687 |
- |
| Navigating the Five Stages of Grief During a Breach |
- |
Dec 02, 2019 |
2568 |
- |
| CrowdStrike Services Report Focuses on Trends Observed in 2019 and the Outlook for 2020 |
- |
Dec 02, 2019 |
1628 |
- |
| Patch Tuesday Turns 20: The Growth and Impact of Microsoft’s Vulnerability Problem |
- |
Dec 02, 2019 |
2335 |
- |
| New Emphasis on an Old Problem: Patch Management and Accountability |
CrowdStrike CSO |
Dec 02, 2019 |
2062 |
- |
| Uncovering The “Unknown Unknowns”: Why Threat Hunting is a Security Must-Have |
- |
Dec 02, 2019 |
1892 |
- |
| May 2022 Patch Tuesday: Six Critical CVEs Fixed and a Windows Vulnerability Actively Exploited |
- |
Dec 02, 2019 |
2410 |
- |
| Open Source Active Reconnaissance (Red Team) |
- |
Dec 02, 2019 |
2389 |
- |
| CrowdStrike ShellShock Scanner - New Community Tool |
Dmitri |
Dec 02, 2019 |
1259 |
- |
| 3 Ways Small Businesses Can Make Big Strides in Cybersecurity |
- |
Dec 02, 2019 |
1795 |
- |
| 4 Examples of Third-Party Testing and Customer Reviews that Highlight CrowdStrike’s Cybersecurity Leadership |
GuLoader |
Dec 02, 2019 |
2617 |
- |
| Mergers and Acquisitions: Cybersecurity Due Diligence |
OLD |
Dec 02, 2019 |
1959 |
- |
| CrowdStrike Summer Release Brings New Modules and Features to the Falcon Platform |
CrowdStrike |
Dec 02, 2019 |
2333 |
- |
| Blind Spots in the Cloud |
- |
Dec 02, 2019 |
2540 |
- |
| Who is Anchor Panda |
AdamM |
Dec 02, 2019 |
1526 |
- |
| CrowdStrike Brings AI-Powered Cybersecurity to Small and Medium-Sized Businesses |
- |
Dec 02, 2019 |
1812 |
- |
| Stop Breaches With Complete Confidence? Customers Say Falcon Complete Can |
Forrester |
Dec 02, 2019 |
2223 |
- |
| CROWDSTRIKE FALCON® XDR: Why You Must Start With EDR to Get XDR |
- |
Dec 02, 2019 |
2613 |
- |
| CrowdStrike Launches Free Targeted Log4j Search Tool |
Apache |
Dec 02, 2019 |
1977 |
- |
| New Cybersecurity Executive Order: What It Means for the Public Sector |
- |
Dec 02, 2019 |
2351 |
- |
| Falcon Prevent Free Trial: Because Evaluating Next-Gen AV Solutions Should Be Fast and Easy |
- |
Dec 02, 2019 |
1768 |
- |
| Rhetoric Foreshadows Cyber Activity in the South China Sea |
- |
Dec 02, 2019 |
1887 |
- |
| OverWatch Casts a Wide Net for Follina: Hunting Beyond the Proof of Concept |
OverWatch |
Dec 02, 2019 |
2340 |
- |
| The CrowdStrike 2020 Global Threat Report Reveals Troubling Advances in Cybercrime |
- |
Dec 02, 2019 |
1534 |
- |
| The 6 Requirements of True Next-Gen Endpoint Protection |
- |
Dec 02, 2019 |
2041 |
- |
| cr8escape: New Vulnerability in CRI-O Container Engine Discovered by CrowdStrike (CVE-2022-0811) |
CrowdStrike |
Dec 02, 2019 |
2984 |
- |
| New Message Center Improves Response Time by Reducing Friction in MDR Collaboration |
Reducing Friction |
Dec 02, 2019 |
1849 |
- |
| CrowdStrike Achieves Red Hat OpenShift Certification: Streamlining Visibility and Automating Protection for OpenShift |
Red Hat |
Dec 02, 2019 |
1731 |
- |
| CrowdStrike CEO George Kurtz in Entrepreneur Magazine: What It Takes to Lead |
McAfee |
Dec 02, 2019 |
2065 |
- |
| The Three Steps of Proactive Threat Hunting |
- |
Dec 02, 2019 |
1534 |
- |
| Enabling Breach Prevention on Red Hat OpenShift Service on AWS (ROSA) |
Red Hat |
Dec 02, 2019 |
1791 |
- |
| April 2021 Patch Tuesday: Active Exploits and Another Zero-Day Vulnerability |
Microsoft |
Dec 02, 2019 |
2233 |
- |
| Duck Hunting with Falcon Complete: A Fowl Banking Trojan Evolves, Part 2 |
- |
Dec 02, 2019 |
2618 |
- |
| PROPHET SPIDER Exploits Oracle WebLogic to Facilitate Ransomware Activity |
PROPHET SPIDER |
Dec 02, 2019 |
3927 |
- |
| How the CrowdStrike Falcon Platform Drove the Germany-Singapore Team to Success at NATO Locked Shields 2025 |
- |
Dec 02, 2019 |
1922 |
- |
| CrowdStrike Introduces Sandbox Scryer: A Free Threat-Hunting Tool for Generating MITRE ATT&CK and Navigator Data |
ATT |
Dec 02, 2019 |
2566 |
- |
| Election Security: Continued Vigilance Is Key |
- |
Dec 02, 2019 |
2879 |
- |
| Inside the Takedown of ZOMBIE SPIDER and the Kelihos Botnet |
Falcon Intelligence |
Dec 02, 2019 |
1863 |
- |
| The Current State of Exploit Development, Part 2 |
Morten Schenk |
Dec 02, 2019 |
3962 |
- |
| New Protection Capability of Falcon for Mac: Improving Security With SUIDGuard |
AlexI |
Dec 02, 2019 |
2296 |
- |
| I am Ironman: DEEP PANDA Uses Sakula Malware to Target Organizations in Multiple Sectors |
Dropper
In |
Dec 02, 2019 |
1946 |
- |
| CrowdStrike Debuts Product and Partnership News at AWS re:Invent 2019 |
David Brown |
Dec 02, 2019 |
2015 |
- |
| RSAC 2022: CrowdStrike Delivers Protection that Powers Productivity |
Logging Everything |
Dec 02, 2019 |
2498 |
- |
| *NEW* Community Tool: CrowdStrike Heartbleed Scanner |
- |
Dec 02, 2019 |
1376 |
- |
| CrowdStrike Named a Leader in Frost & Sullivan CWPP Radar, Demonstrating Strong Innovation and Growth |
- |
Dec 02, 2019 |
2303 |
- |
| CharCNNs and PowerShell Scripts: Yet Another Fight Against Malware |
- |
Dec 02, 2019 |
3216 |
- |
| Architecture Drift: What It Is and How It Leads to Breaches |
- |
Dec 02, 2019 |
1873 |
- |
| Not a SIMulation: CrowdStrike Investigations Reveal Intrusion Campaign Targeting Telco and BPO Companies |
CrowdStrike Services |
Dec 02, 2019 |
4076 |
- |
| CrowdStrike Named a Customers’ Choice in 2024 Gartner® Voice of the Customer for Endpoint Protection Platform Report |
- |
Dec 02, 2019 |
2132 |
- |
| The Common Cloud Misconfigurations That Lead to Cloud Data Breaches |
- |
Dec 02, 2019 |
2468 |
- |
| CrowdStrike’s Solution to Help School Districts Meet Cybersecurity Challenges |
- |
Dec 02, 2019 |
1911 |
- |
| Moving beyond Indicators of Compromise (IOCs) |
Chinese |
Dec 02, 2019 |
1534 |
- |
| Scheming with URLs: One-Click Attack Surface in Linux Desktop Environments |
Remmina |
Dec 02, 2019 |
3653 |
- |
| CrowdStrike Partners with Center for Threat-Informed Defense to Reveal Top Attack Techniques Defenders Should Prioritize |
MITRE Engenuity |
Dec 02, 2019 |
2340 |
- |
| Intermex Reduces Critical Vulnerabilities by 98% with Falcon Exposure Management |
ExPRT |
Dec 02, 2019 |
2238 |
- |
| Accelerate Your Digital Transformation With the Falcon Platform’s Unified Approach to Security |
IBM |
Dec 02, 2019 |
2245 |
- |
| The Maturation of Cloud-native Security: Securing Modern Apps and Infrastructure |
Falcon Cloud Security |
Dec 02, 2019 |
1952 |
- |
| The Hoot Podcast (Episode 33): Financial Services Roundtable |
- |
Dec 02, 2019 |
1277 |
- |
| Pandemic Response Presents “Good Timing” for a Security Review, Says CrowdStrike’s Ian McShane |
- |
Dec 02, 2019 |
1492 |
- |
| The Prevention Continuum: Preventing Silent Failure |
CrowdStrike |
Dec 02, 2019 |
2940 |
- |
| CrowdStrike Positioned as a Magic Quadrant “Leader” and Furthest for “Completeness of Vision” in the 2019 Gartner Magic Quadrant for EPP |
Gartner |
Dec 02, 2019 |
1891 |
- |
| CrowdStrike Named the Only Leader in GigaOm Radar for SaaS Security Posture Management |
CrowdStrike |
Dec 02, 2019 |
1882 |
- |
| Who is Salty Spider (Sality)? |
AdamM |
Dec 02, 2019 |
1665 |
- |
| How Humio Outpaces Traditional Logging Solutions and Leaves Competitors in the Dust |
- |
Dec 02, 2019 |
1819 |
- |
| Actionable Indicators for Detection of Signs of Compromise from Target-related Breaches |
- |
Dec 02, 2019 |
1568 |
- |
| Meet the Channel Chief: Michael Rogers Shares How CrowdStrike Is Driving Growth for Partners |
CrowdStrike |
Dec 02, 2019 |
2359 |
- |
| Hacktivist Entity USDoD Claims to Have Leaked CrowdStrike’s Threat Actor List |
- |
Dec 02, 2019 |
1491 |
- |
| Attackers Are Targeting Cloud Service Providers |
CrowdStrike CSO |
Dec 02, 2019 |
1913 |
- |
| Response When Minutes Matter: RDP — Remote Desktop Pwnage, Part 2 |
CrowdStrike |
Dec 02, 2019 |
2254 |
- |
| Going Beyond Malware: The Rise of “Living off the Land” Attacks |
- |
Dec 02, 2019 |
2050 |
- |
| Cybersecurity Blog |
- |
Dec 02, 2019 |
1764 |
- |
| Why You Should Self-Isolate but Your IT Infrastructure Should Not |
- |
Dec 02, 2019 |
3072 |
- |
| Building Cybersecurity from the Ground Up — Part 1: The Business Perspective |
EKaplan |
Dec 02, 2019 |
2177 |
- |
| Mirai Malware Variants for Linux Double Down on Stronger Chips in Q1 2022 |
CrowdStrike |
Dec 02, 2019 |
2191 |
- |
| Employing FeatureUsage for Windows 10 Taskbar Forensics |
- |
Dec 02, 2019 |
2321 |
- |
| How to use the Humio Operator to run Humio on Kubernetes |
Humio |
Dec 02, 2019 |
2223 |
- |
| Three Best Practices for Building a High-Performance Graph Database |
- |
Dec 02, 2019 |
2693 |
- |
| Cloud & Application Security |
Frost |
Dec 02, 2019 |
7541 |
- |
| Five Steps to a Bulletproof Business Case for MDR |
- |
Dec 02, 2019 |
2652 |
- |
| Malspam in the Time of COVID-19 |
CrowdStrike CTO Mike Sentonas |
Dec 02, 2019 |
2843 |
- |
| See the COMPLETE Picture: New Study Reveals the Benefits of Fully Managed Detection and Response |
Forrester Consulting |
Dec 02, 2019 |
2293 |
- |
| Humio Recognized as Top 3 Observability Award Winner by EMA |
EMA
September |
Dec 02, 2019 |
1506 |
- |
| CrowdXDR Alliance Expands to Help Security Teams Identify and Hunt Threats Faster |
- |
Dec 02, 2019 |
1861 |
- |
| Register Now to Join Us in Las Vegas for Fal.Con 2022 |
- |
Dec 02, 2019 |
1713 |
- |
| Don’t Take The Vendor’s Word For It: The Importance of Third-Party Testing |
Alvin Toffler |
Dec 02, 2019 |
2556 |
- |
| Two Birds, One STONE PANDA |
China |
Dec 02, 2019 |
3290 |
- |
| Cat Scratch Fever: CrowdStrike Tracks Newly Reported Iranian Actor as FLYING KITTEN |
CrowdStrike Intelligence |
Dec 02, 2019 |
1751 |
- |
| CrowdStrike Falcon® Protects from New Wiper Malware Used in Ukraine Cyberattacks |
- |
Dec 02, 2019 |
2185 |
- |
| CROWDSTRIKE FALCON XDR: Delivered at the Speed and Scale of the CrowdStrike Security Cloud |
- |
Dec 02, 2019 |
1891 |
- |
| CrowdStrike Falcon Cloud Security Delivers the Future of CNAPP |
Gartner |
Dec 02, 2019 |
2268 |
- |
| CrowdStrike Strengthens SMB Security with Seamless Mobile Protection |
Falcon Go |
Dec 02, 2019 |
1787 |
- |
| CrowdStrike Plans to Advance Zero Trust Capabilities with Acquisition of Preempt Security |
- |
Dec 02, 2019 |
1783 |
- |
| Taking Protection to a New Level: CrowdStrike Announces its $1 Million Breach Prevention Warranty |
- |
Dec 02, 2019 |
1546 |
- |
| CrowdStrike Protects, On and Off the Track |
- |
Dec 02, 2019 |
1685 |
- |
| Pwn2Own: A Tale of a Bug Found and Lost Again |
- |
Dec 02, 2019 |
4886 |
- |
| Google Capital Bets Big on CrowdStrike to Accelerate Hyper-growth |
Google Capital |
Dec 02, 2019 |
2048 |
- |
| How Small Details Build Up to Big Success |
- |
Dec 02, 2019 |
1726 |
- |
| State of the Criminal Address |
PoS |
Dec 02, 2019 |
2587 |
- |
| Welcome to Fal.Con 2022: CrowdStrike Drives the Convergence of Security and Observability |
CrowdStrike Asset Graph |
Dec 02, 2019 |
2392 |
- |
| Threat Hunting & Intel |
MURKY PANDA |
Dec 02, 2019 |
10758 |
- |
| Security Guidance from the Front Lines of Cloud Incident Response |
- |
Dec 02, 2019 |
2424 |
- |
| CrowdStrike Extends Identity Security Capabilities to Stop Attacks in the Cloud |
- |
Dec 02, 2019 |
2055 |
- |
| Improve Threat Hunting with Long-Term, Cost-Effective Data Retention |
- |
Dec 02, 2019 |
1917 |
- |
| CrowdStrike Falcon® on GovCloud: Cloud-Delivered Endpoint Protection for the Public Sector |
FedRAMP |
Dec 02, 2019 |
1836 |
- |
| Hunting a Global Telecommunications Threat: DecisiveArchitect and Its Custom Implant JustForFun |
CrowdStrike Intelligence |
Dec 02, 2019 |
3057 |
- |
| For the Second Year in a Row, CrowdStrike Has Highest Overall Rating Among Vendors Named a November 2019 Gartner Peer Insights Customer’s Choice |
Gartner |
Dec 02, 2019 |
1991 |
- |
| Threat Actor “Magecart”: Coming to an eCommerce Store Near You |
Magecart |
Dec 02, 2019 |
3203 |
- |
| October 2022 Patch Tuesday: 13 Critical CVEs, One Actively Exploited Bug, ProxyNotShell Still Unpatched |
Extended Support Updates |
Dec 02, 2019 |
2534 |
- |
| Three Recommendations for a Next-Generation Cybersecurity Framework |
- |
Dec 02, 2019 |
2343 |
- |
| Build Your Cyber Resiliency at Fal.Con for Public Sector 2021 |
- |
Dec 02, 2019 |
1889 |
- |
| 2022 Global Threat Report: A Year of Adaptability and Perseverance |
- |
Dec 02, 2019 |
1810 |
- |
| How Malicious Insiders Use Known Vulnerabilities Against Their Organizations |
Dean |
Dec 02, 2019 |
4077 |
- |
| CrowdStrike Named a Leader in 2025 IDC MarketScape for Worldwide Incident Response Services |
AI
CrowdStrike |
Dec 02, 2019 |
1898 |
- |
| Stopping Cloud Breaches at Machine Speed: How CrowdStrike Uses Agentic AI to Power Cloud Detection and Response |
- |
Dec 02, 2019 |
2082 |
- |
| Integer Overflow in Active Directory (CVE-2020-1267) |
CrowdStrike |
Dec 02, 2019 |
1729 |
- |
| Inside Mondelēz’s Identity Security Strategy with CrowdStrike |
- |
Dec 02, 2019 |
1868 |
- |
| GuLoader: Peering Into a Shellcode-based Downloader |
GuLoader |
Dec 02, 2019 |
3412 |
- |
| Response When Minutes Matter: RDP — Remote Desktop Pwnage, Part 1 |
Falcon InsightTM EDR |
Dec 02, 2019 |
2699 |
- |
| Streaming Live Data is the Heart of Observability |
- |
Dec 02, 2019 |
2152 |
- |
| W-2 Phishing Scam Adds a New Twist to Wire Transfer Fraud |
- |
Dec 02, 2019 |
2057 |
- |
| Small Screens, Big Risks: Falcon for Mobile Releases New Innovations to Accelerate Detection and Response for Mobile Threats |
Forrester |
Dec 02, 2019 |
2455 |
- |
| Three Key Features of Log Management for Cloud Native Systems |
- |
Dec 02, 2019 |
1640 |
- |
| CrowdStrike 2024 Global Threat Report: Adversaries Gain Speed and Stealth |
- |
Dec 02, 2019 |
1955 |
- |
| The Risks of Expired SSL Certificates |
Apple |
Dec 02, 2019 |
2473 |
- |
| 5 Partner Predictions for 2023 from CrowdStrike’s Channel Chief |
- |
Dec 02, 2019 |
1680 |
- |
| CrowdStrike Named a Leader in 2025 IDC MarketScape for Exposure Management |
CrowdStrike Threat Graph |
Dec 02, 2019 |
1924 |
- |
| Endpoint Security & XDR |
ESG |
Dec 02, 2019 |
17441 |
- |
| How to Fill the Cybersecurity Skills Gap With Homegrown Talent |
- |
Dec 02, 2019 |
2156 |
- |
| The Security Roadmap – Planning for Job Security |
- |
Dec 02, 2019 |
2628 |
- |
| CrowdStrike Automates Vulnerability Remediation Processes While Enhancing SecOps Visibility |
- |
Dec 02, 2019 |
2255 |
- |
| Follow the Money: How eCriminals Monetize Ransomware |
- |
Dec 02, 2019 |
2187 |
- |
| 2019 Global Threat Report Shows It Takes Innovation and Speed to Win Against Adversaries |
- |
Dec 02, 2019 |
1874 |
- |
| Making Threat Graph Extensible: Leveraging the Intermediate Representation to Generate Go Code (Part 2 of 2) |
HCL |
Dec 02, 2019 |
2613 |
- |
| Sidoh: WIZARD SPIDER’s Mysterious Exfiltration Tool |
WIZARD SPIDER |
Dec 02, 2019 |
3623 |
- |
| Community Power: The CrowdStrike Security Cloud Network Effect |
- |
Dec 02, 2019 |
1999 |
- |
| Should You Worry About Software Supply Chain Attacks? |
CrowdStrike |
Dec 02, 2019 |
2418 |
- |
| New CrowdResponse Modules |
ChadJustin |
Dec 02, 2019 |
2496 |
- |
| CrowdStrike Defines the Future of Cloud Security with One-Click XDR to Automatically Identify and Secure Unmanaged Cloud Assets |
- |
Dec 02, 2019 |
2231 |
- |
| CrowdStrike Falcon® Demonstrates Continued Excellence in Recent AV-Comparatives Evaluations |
- |
Dec 02, 2019 |
2139 |
- |
| Announcing CrowdStrike Falcon Counter Adversary Operations Elite |
- |
Dec 02, 2019 |
1874 |
- |
| Detecting and Preventing Kernel Attacks |
Google Project Zero |
Dec 02, 2019 |
1874 |
- |
| BadRabbit MS17-010 Exploitation Part Two: Elevate Privileges |
BadRabbit |
Dec 02, 2019 |
3459 |
- |
| Five Questions Security Teams Need to Ask to Use Generative AI Responsibly |
CrowdStrike |
Dec 02, 2019 |
3018 |
- |
| CrowdStrike Falcon for Mobile Unlocks New Mobile Security Options for SMBs |
- |
Dec 02, 2019 |
2086 |
- |
| New Charlotte AI Innovations Enable Prompt Collaboration and Demystify Script Analysis |
CrowdStrike |
Dec 02, 2019 |
2059 |
- |
| CrowdStrike Offers Cybersecurity Professional Services in AWS Marketplace |
- |
Dec 02, 2019 |
1752 |
- |
| 5 Tips to Defend Against Access Brokers This Holiday Season |
- |
Dec 02, 2019 |
2726 |
- |
| How CrowdStrike’s Machine Learning Model Automation Uses the Cloud to Maximize Detection Efficacy |
- |
Dec 02, 2019 |
2417 |
- |
| CrowdStrike Falcon® Identity Threat Protection Added to GovCloud-1 to Help Meet Government Mandates for Identity Security and Zero Trust |
Falcon Identity Threat Protection |
Dec 02, 2019 |
3557 |
- |
| CrowdStrike Falcon® Continues Impressive Record with Highest AAA Rating in SE Labs Enterprise Endpoint Protection Report |
- |
Dec 02, 2019 |
1843 |
- |
| Managed Threat Hunting Bridges the Talent Gap |
- |
Dec 02, 2019 |
2123 |
- |
| Top 5 Cybersecurity Mistakes Companies Make and How to Avoid Them |
- |
Dec 02, 2019 |
2167 |
- |
| What Sets Falcon Apart: Intelligent Host Sensors |
CrowdStrike Falcon |
Dec 02, 2019 |
1948 |
- |
| A Legal Perspective: Best Practices for Prevention and Immediate Response to a Breach |
Mark Goudie |
Dec 02, 2019 |
1833 |
- |
| Outpacing the Adversary: Three Tips on How Mature Organizations Can Continuously Improve Cybersecurity |
Lloyds Banking Group |
Dec 02, 2019 |
1922 |
- |
| CrowdStrike to Acquire Flow Security, Sets the Standard for Modern Cloud Data Security |
- |
Dec 02, 2019 |
2083 |
- |
| Who Is PIONEER KITTEN? |
PIONEER KITTEN |
Dec 02, 2019 |
1667 |
- |
| CrowdStrike Falcon Protects Customers from Follina (CVE-2022-30190) |
- |
Dec 02, 2019 |
1791 |
- |
| Webcast: Unique Security Coalition Aims to Guide Work-From-Home Transition |
- |
Dec 02, 2019 |
1499 |
- |
| April 2024 Patch Tuesday: Three Critical RCE Vulnerabilities in Microsoft Defender for IoT |
Extended Security Update |
Dec 02, 2019 |
1914 |
- |
| The Hoot Podcast (Episode 22): Humio at Vijilan with Kevin Nejad, Founder and CEO |
- |
Dec 02, 2019 |
1378 |
- |
| Defending Against SCATTERED SPIDER with Falcon Next-Gen SIEM |
End UserMicrosoft |
Dec 02, 2019 |
3713 |
- |
| More Than Just Your eSignature: The Analysis |
Google |
Dec 02, 2019 |
2460 |
- |
| July 2021 Patch Tuesday: Greatest Number of Updates for Ongoing Zero-Day Vulnerabilities Year-to-Date |
- |
Dec 02, 2019 |
2511 |
- |
| Seeing into the Shadows: Tackling ChromeOS Blind Spots with Dell and CrowdStrike |
Dell SafeGuard |
Dec 02, 2019 |
1595 |
- |
| CrowdStrike Falcon® Pro for Mac Wins Fourth AV-Comparatives Approved Security Product Award |
- |
Dec 02, 2019 |
1703 |
- |
| CVE-2014-1761 - The Alley of Compromise |
CrowdStrike |
Dec 02, 2019 |
2254 |
- |
| RSAC 2022: CrowdStrike Innovations that Prioritize Data |
CrowdStrike CEO George Kurtz |
Dec 02, 2019 |
2955 |
- |
| April 2022 Patch Tuesday: 10 Critical CVEs, One Zero-Day Under Attack and Wormable Bugs |
CrowdStrike Intelligence |
Dec 02, 2019 |
2537 |
- |
| Identity Threat Hunting: How CrowdStrike Counter Adversary Operations Is Leading the Charge |
CrowdStrike |
Dec 02, 2019 |
2118 |
- |
| Protect Your Robot Workforce: Extending Endpoint Protection to Robotic Process Automation (RPA) in a First-of-its-Kind Integration |
- |
Dec 02, 2019 |
2088 |
- |
| Digging into BokBot’s Core Module |
BokBot |
Dec 02, 2019 |
5275 |
- |
| An End to “Smash-and-Grab” and a Move to More Targeted Approaches |
CrowdStrike Services |
Dec 02, 2019 |
2060 |
- |
| Top 5 SIEM Use Cases CrowdStrike Falcon LogScale Solves Today |
- |
Dec 02, 2019 |
2737 |
- |
| CrowdStrike’s View on the New U.S. Policy for Artificial Intelligence |
- |
Dec 02, 2019 |
2273 |
- |
| 5 Crucial Steps to Protect Your Resources in Google Cloud |
- |
Dec 02, 2019 |
2624 |
- |
| Interview with Simon Phillips, experienced security practitioner and Humio customer |
Simon Phillips |
Dec 02, 2019 |
1391 |
- |
| CrowdStrike Congressional Testimony: 5 Recommendations to Secure the Public Sector |
- |
Dec 02, 2019 |
2041 |
- |
| The Windows Restart Manager: How It Works and How It Can Be Hijacked, Part 1 |
Windows |
Dec 02, 2019 |
3873 |
- |
| Why Managed Threat Hunting Should Top Every CISO’s Holiday Wish List |
- |
Dec 02, 2019 |
2796 |
- |
| How cybercrime and cybersecurity affects nations and geopolitics |
- |
Dec 02, 2019 |
2090 |
- |
| Clarity in the Cloud: See More, Know More, Do More With Falcon Horizon |
- |
Dec 02, 2019 |
1843 |
- |
| Ploutus ATM Malware Case Study: Automated Deobfuscation of a Strongly Obfuscated .NET Binary |
Ploutus |
Dec 02, 2019 |
4448 |
- |
| CrowdStrike Falcon® Awarded AV-Comparatives Approved Business Security Product for the Second Time in 2021 |
- |
Dec 02, 2019 |
1888 |
- |
| CrowdStrike Falcon Next-Gen SIEM Unveils Advanced Detection of Ransomware Targeting VMware ESXi Environments |
- |
Dec 02, 2019 |
2102 |
- |
| NTLM Keeps Haunting Microsoft |
PetitPotam |
Dec 02, 2019 |
2744 |
- |
| CrowdStrike Drives Cybersecurity Forward with New Innovations Spanning AI, Cloud, Next-Gen SIEM and Identity Protection |
CrowdStrike Financial Services |
Dec 02, 2019 |
3270 |
- |
| CrowdStrike Falcon® Protects Customers from Recent COZY BEAR Sophisticated Phishing Campaign |
CrowdStrike |
Dec 02, 2019 |
1649 |
- |
| Redefining the “We” in “We Stop Breaches” |
- |
Dec 02, 2019 |
1781 |
- |
| Big Game Hunting: The Evolution of INDRIK SPIDER From Dridex Wire Fraud to BitPaymer Targeted Ransomware |
INDRIK SPIDER |
Dec 02, 2019 |
5702 |
- |
| CrowdStrike Falcon® Certified as Legacy AV Replacement |
- |
Dec 02, 2019 |
1758 |
- |
| Five Steps to Kick-start Your Move to XDR |
- |
Dec 02, 2019 |
2335 |
- |
| CrowdStrike Falcon Pro for Mac Achieves Highest Score in AV-TEST MacOS Evaluation for Business Users (March 2022) |
- |
Dec 02, 2019 |
1884 |
- |
| Fal.Con 2020: Why Cloud Security Innovation Is Critical |
- |
Dec 02, 2019 |
2703 |
- |
| Preliminary Post Incident Review (PIR): Content Configuration Update Impacting the Falcon Sensor and the Windows Operating System (BSOD) |
CrowdStrike |
Dec 02, 2019 |
2508 |
- |
| 5 Key Data Protection Challenges and How to Overcome Them |
SaaS |
Dec 02, 2019 |
2569 |
- |
| CrowdStrike Falcon® Named Best EDR by SE Labs, Delivering 100% Detection, 0% Noise |
SE Labs |
Dec 02, 2019 |
2215 |
- |
| CrowdStrike’s 2018 Global Threat Report Reveals the Trends, Insights and Threat Actors You Need to Know |
- |
Dec 02, 2019 |
1690 |
- |
| Proactive Threat Hunting Bears Fruit: Falcon OverWatch Detects Novel IceApple Post-Exploitation Framework |
- |
Dec 02, 2019 |
1964 |
- |
| Discovering the Critical OpenSSL Vulnerability with the CrowdStrike Falcon Platform |
AppVendor |
Dec 02, 2019 |
1807 |
- |
| Rare Glimpse into a Real-Life Command-and-Control Server |
- |
Dec 02, 2019 |
1936 |
- |
| On-demand Webcast: CrowdStrike Experts on COVID-19 Cybersecurity Challenges and Recommendations |
COVID |
Dec 02, 2019 |
2123 |
- |
| Linux-Targeted Malware Increases by 35% in 2021: XorDDoS, Mirai and Mozi Most Prevalent |
CrowdStrike |
Dec 02, 2019 |
2157 |
- |
| DirtyCred: Opening Pandora’s Box to Current and Future Container Escapes |
DirtyCred |
Dec 02, 2019 |
2482 |
- |
| Staying Off the Land: A Threat Actor Methodology |
- |
Dec 02, 2019 |
2541 |
- |
| CrowdStrike Positioned Highest for Ability to Execute and Furthest for Completeness of Vision in the Visionary Quadrant of the 2018 Gartner Magic Quadrant for Endpoint Protection Platforms |
Gartner |
Dec 02, 2019 |
1713 |
- |
| Three Times a Leader: CrowdStrike Named a Leader in Gartner® Magic Quadrant™ for Endpoint Protection Platforms |
- |
Dec 02, 2019 |
2136 |
- |
| Four Takeaways as the European Union’s General Data Protection Regulation (GDPR) Turns 4 |
CrowdStrike |
Dec 02, 2019 |
2221 |
- |
| Modernize Your Security Stack with the Falcon Platform |
MITRE |
Dec 02, 2019 |
2497 |
- |
| The 5 Steps of Log Management: Essential Steps to Improve Observability, Enhance Security, and Monitor System and Application Performance |
- |
Dec 02, 2019 |
2455 |
- |
| Threat Actor Uses Fake CrowdStrike Recovery Manual to Deliver Unidentified Stealer |
- |
Dec 02, 2019 |
1724 |
- |
| SMB Cybersecurity: How Small Businesses Solve Big Challenges with CrowdStrike |
- |
Dec 02, 2019 |
2143 |
- |
| Custom Dashboard Offers Greater Visibility for Zerologon Vulnerability |
SE Labs |
Dec 02, 2019 |
1802 |
- |
| Big Data, Graph, and the Cloud: Three Keys to Stopping Today’s Threats |
- |
Dec 02, 2019 |
2190 |
- |
| LemonDuck Targets Docker for Cryptomining Operations |
CrowdStrike |
Dec 02, 2019 |
2499 |
- |
| CrowdStrike Falcon Platform Achieves 100% Detection and Protection Against MacOS Malware with Zero False Positives in Latest MacOS AV-TEST |
Deloitte |
Dec 02, 2019 |
2001 |
- |
| Tales from the Dark Web: How Tracking eCrime’s Underground Economy Improves Defenses |
RaaS
Ransomware |
Dec 02, 2019 |
2515 |
- |
| "Sin”-ful SPIDERS: WIZARD SPIDER and LUNAR SPIDER Sharing the Same Web |
CrowdStrike Intelligence |
Dec 02, 2019 |
2520 |
- |
| CrowdStrike and Cloudflare Expand Zero Trust from Devices and Identities to Applications |
- |
Dec 02, 2019 |
2041 |
- |
| Automating Remote Remediation of TrickBot via Falcon’s Real Time Response API: Part 1 |
- |
Dec 02, 2019 |
3376 |
- |
| Dealing with Out-of-memory Conditions in Rust |
OOM |
Dec 02, 2019 |
4265 |
- |
| Baselining and Hunting Log4Shell with the CrowdStrike Falcon® Platform |
Log |
Dec 02, 2019 |
2768 |
- |
| How Falcon Next-Gen SIEM Protects Enterprises from VMware vCenter Attacks |
CrowdStrike |
Dec 02, 2019 |
3526 |
- |
| The Evolution of Protected Processes - Part 1: Pass-the-Hash Mitigations in Windows 8.1 |
AlexI |
Dec 02, 2019 |
3409 |
- |
| Exposure Management |
Spotting Malicious Browser Extensions
June |
Dec 02, 2019 |
6155 |
- |
| Nothing else is working. Why not memory forensics? |
- |
Dec 02, 2019 |
1785 |
- |
| Buying IAM and Identity Security from the Same Vendor? Think Again. |
- |
Dec 02, 2019 |
2562 |
- |
| CrowdStrike Wins Technology Innovation Leadership Award, Continues Dominance in Endpoint Security Market |
- |
Dec 02, 2019 |
2027 |
- |
| Data Protection Day 2023: Misaligned Policy Priorities Complicate Data Protection Compliance |
CrowdStrike Threat Graph |
Dec 02, 2019 |
2201 |
- |
| Python 2to3: Tips From the CrowdStrike Data Science Team |
- |
Dec 02, 2019 |
3033 |
- |
| ITProPortal: CrowdStrike Discusses Life Beyond Malware |
- |
Dec 02, 2019 |
2034 |
- |
| 5 Tips for a Happy Marriage Between IT Cybersecurity and Operational Technology Teams |
Security Experts |
Dec 02, 2019 |
3103 |
- |
| CrowdStrike Cloud Security Defines the Future of an Evolving Market |
- |
Dec 02, 2019 |
2130 |
- |
| Exploiting GlobalProtect for Privilege Escalation, Part One: Windows |
Palo Alto Networks |
Dec 02, 2019 |
3047 |
- |
| Move from a High-Cost Legacy SIEM to High-Speed Falcon LogScale |
- |
Dec 02, 2019 |
2188 |
- |
| Cyber Skirmish: Russia v. Turkey |
AdamM |
Dec 02, 2019 |
1774 |
- |
| Why the Most Effective XDR Is Rooted in Endpoint Detection and Response |
- |
Dec 02, 2019 |
2060 |
- |
| QakBot eCrime Campaign Leverages Microsoft OneNote Attachments |
Microsoft |
Dec 02, 2019 |
3194 |
- |
| Common Attacks and Effective Mitigation: 2020 CrowdStrike Services Report Key Findings (Part 2 of 2) |
CrowdStrike CSO |
Dec 02, 2019 |
1931 |
- |
| A Hunter’s Perspective: Detecting Formbook 3.8 Activity in Your Environment |
- |
Dec 02, 2019 |
2226 |
- |
| HIPAA PHI Getting Tougher to Safeguard but Compliance is Still Critical |
- |
Dec 02, 2019 |
1767 |
- |
| Trust Erodes Amid Ransomware Growth: 2021 CrowdStrike Global Security Attitude Survey |
- |
Dec 02, 2019 |
2057 |
- |
| Gartner Report: Prepare for Endpoint Protection Shifting to the Cloud |
- |
Dec 02, 2019 |
2135 |
- |
| Addressing Uneven Partition Lag in Kafka |
- |
Dec 02, 2019 |
2175 |
- |
| Building Cybersecurity from the Ground Up — Part 2: The Technology Basics |
EKaplan |
Dec 02, 2019 |
2387 |
- |
| Duck Hunting with Falcon Complete: Remediating a Fowl Banking Trojan, Part 3 |
Falcon Complete |
Dec 02, 2019 |
2984 |
- |
| CrowdStrike Achieves 100% Protection, 100% Visibility, 100% Analytic Detection in MITRE Engenuity ATT&CK® Evaluations: Enterprise |
MITRE Engenuity |
Dec 02, 2019 |
3180 |
- |
| New CrowdStrike Falcon Fusion Features Refine Workflow Automation for CrowdStrike Customers |
- |
Dec 02, 2019 |
2323 |
- |
| Securing the Generative AI Boom: How CoreWeave Uses CrowdStrike to Secure Its High-Performance Cloud |
- |
Dec 02, 2019 |
1986 |
- |
| Small Business |
- |
Dec 02, 2019 |
1549 |
- |
| Compromised Docker Honeypots Used for Pro-Ukrainian DoS Attack |
Falcon |
Dec 02, 2019 |
2136 |
- |
| CrowdStrike and Google Cloud Expand Strategic Partnership to Deliver Unified Cloud Security |
- |
Dec 02, 2019 |
1916 |
- |
| Do You Know Who’s in Your Cloud? Preventing Identity-Based Threats with CIEM |
CrowdStrike Asset Graph
See |
Dec 02, 2019 |
2120 |
- |
| 5 Common Hybrid IT Security Challenges and How to Overcome Them |
- |
Dec 02, 2019 |
2311 |
- |
| CrowdStrike Falcon® Platform Identifies Supply Chain Attack via a Trojanized Comm100 Chat Installer |
SHA |
Dec 02, 2019 |
2822 |
- |
| Demystifying Data Protection in the Cloud: Runtime vs. At Rest |
- |
Dec 02, 2019 |
2438 |
- |
| Visibility in Incident Response: Don’t Chase Ghosts in Your IT Estate |
- |
Dec 02, 2019 |
2177 |
- |
| CrowdStrike’s Approach to Better Machine Learning Evaluation Using Strategic Data Splitting |
Roberts |
Dec 02, 2019 |
2800 |
- |
| CrowdStrike Discovers First-Ever Dero Cryptojacking Campaign Targeting Kubernetes |
CrowdStrike |
Dec 02, 2019 |
3153 |
- |
| Why Phishing Still Works (and What To Do About It) |
- |
Dec 02, 2019 |
2194 |
- |
| Playing Hide-and-Seek with Ransomware, Part 2 |
Intel |
Dec 02, 2019 |
4364 |
- |
| Online Learning: Staying Ahead of Cyber Threats Anytime and Anywhere |
- |
Dec 02, 2019 |
2277 |
- |
| CSO Online: Insights on Cyber Espionage From CrowdStrike VP Mike Sentonas |
Soumik Gosh |
Dec 02, 2019 |
1664 |
- |
| Cracking the Code of AI Decision Making: Harnessing the Power of SHAP Values |
Feature |
Dec 02, 2019 |
3019 |
- |
| Everything You Think You Know About (Storing and Searching) Logs Is Wrong |
Humio CTO Kresten Krab Thorup |
Dec 02, 2019 |
2681 |
- |
| How CrowdStrike Uses Similarity-Based Mapping to Understand Cybersecurity Data and Prevent Breaches |
- |
Dec 02, 2019 |
3928 |
- |
| CVE-2024-3400: What You Need to Know About the Critical PAN-OS Zero-Day |
April |
Dec 02, 2019 |
2067 |
- |
| Falcon Complete Stops Microsoft Exchange Server Zero-Day Exploits |
ASP |
Dec 02, 2019 |
4276 |
- |
| Join the Challenge: CrowdStrike Intelligence Adversary Quest 2021 |
- |
Dec 02, 2019 |
1579 |
- |
| Who Needs Another Alert? CrowdScore Hunts Attackers Hidden in the Data |
IBM |
Dec 02, 2019 |
2426 |
- |
| Malicious Spear-Phishing Campaign Targets Upcoming Winter Olympics in South Korea |
Ministry |
Dec 02, 2019 |
1809 |
- |
| CrowdStrike Falcon® Discover for AWS: Visibility That Ensures Security in The Cloud |
- |
Dec 02, 2019 |
2047 |
- |
| Recognizing the Resilience of the CrowdStrike Community |
- |
Dec 02, 2019 |
2004 |
- |
| Automation Advancements in Falcon Intelligence Recon: Disrupt the Adversary and Reduce Risk |
CrowdStrike |
Dec 02, 2019 |
2466 |
- |
| Retailer Compares Microsoft with CrowdStrike for Security. The Verdict? “It’s Not Even Close” |
- |
Dec 02, 2019 |
2092 |
- |
| Sheep Year Kernel Heap Fengshui: Spraying in the Big Kids’ Pool |
AlexI |
Dec 02, 2019 |
3607 |
- |
| Meet the Protectors: New Video Series Spotlights Cybersecurity Leaders Powered by CrowdStrike |
CrowdStrike
CrowdStrike |
Dec 02, 2019 |
1673 |
- |
| CrowdStrike Named an Overall Leader in 2022 KuppingerCole Leadership Compass for EPDR Market |
- |
Dec 02, 2019 |
2029 |
- |
| Analyzing Targeted Intrusions Through the ATT&CK Framework Lens [VIDEO] |
- |
Dec 02, 2019 |
1397 |
- |
| CrowdStrike Falcon® Prevents WannaCry Ransomware |
- |
Dec 02, 2019 |
1699 |
- |
| Data Protection Day 2021: Harnessing the Power of Big Data Protection |
- |
Dec 02, 2019 |
2422 |
- |
| The Critical Role of Cybersecurity in M&A: Part 2, Pre-Close |
- |
Dec 02, 2019 |
2480 |
- |
| How Artificial Intelligence is Becoming a Key Weapon in the Cybersecurity War |
Michael Sentonas |
Dec 02, 2019 |
1936 |
- |
| Modernize Your SOC with Falcon Fusion, CrowdStrike’s Integrated SOAR Framework |
CrowdStrike |
Dec 02, 2019 |
2281 |
- |
| Critical Hit: How DoppelPaymer Hunts and Kills Windows Processes |
Protected Process Light |
Dec 02, 2019 |
4644 |
- |
| The Critical Role of Cybersecurity in M&A: Part 3, Post-Close |
- |
Dec 02, 2019 |
3537 |
- |
| The Difference Between Securing Custom-Developed vs. Commercial Off-the-Shelf Software |
- |
Dec 02, 2019 |
2636 |
- |
| 9 Ways a CISO Uses CrowdStrike for Identity Threat Protection |
CrowdStrike |
Dec 02, 2019 |
2329 |
- |
| Where Is the Cyber Insurance Market Going? |
Dan Trueman |
Dec 02, 2019 |
2377 |
- |
| CVE-2024-3094 and the XZ Upstream Supply Chain Attack: What You Need to Know |
Distro |
Dec 02, 2019 |
2266 |
- |
| CrowdStrike and NIST 800-53: Now That’s What I Call a “Twofer” |
- |
Dec 02, 2019 |
1585 |
- |
| Your Session Key Is My Session Key: How to Retrieve the Session Key for Any Authentication |
- |
Dec 02, 2019 |
2515 |
- |
| CrowdStrike Named a Leader with “Bold Vision” in 2024 Forrester Wave for Cybersecurity Incident Response Services |
- |
Dec 02, 2019 |
1815 |
- |
| CrowdStrike Scores Highest Overall for Use Case Type A or “Forward-Leaning” Organizations in Gartner’s 2019 Critical Capabilities for Endpoint Protection Platforms |
Gartner Inc |
Dec 02, 2019 |
1808 |
- |
| New Executive Order Forces Federal Agencies to Rethink Log Management |
- |
Dec 02, 2019 |
1980 |
- |
| Software Supply Chain Attacks Gained Traction in 2017 and Are Likely to Continue |
- |
Dec 02, 2019 |
1717 |
- |
| Falcon Intelligence Report: Wanna Ransomware Spreads Rapidly; CrowdStrike Falcon® Prevents the Attack |
- |
Dec 02, 2019 |
1725 |
- |
| 5 Steps Endpoint Security Buyers are Taking to Improve Protection |
- |
Dec 02, 2019 |
1777 |
- |
| CVE-2022-0185: Kubernetes Container Escape Using Linux Kernel Exploit |
Seccomp |
Dec 02, 2019 |
2513 |
- |
| Qatar’s Commercial Bank Chooses CrowdStrike Falcon®: A Partnership Based on Trust [VIDEO] |
- |
Dec 02, 2019 |
1554 |
- |
| CrowdStrike: Culture Can’t Be Copied |
- |
Dec 02, 2019 |
1744 |
- |
| Building on the Shoulders of Giants: Combining TensorFlow and Rust |
- |
Dec 02, 2019 |
2442 |
- |
| CrowdStrike Summer Release 2017: Falcon Search Engine Brings Speed and Agility to Cybersecurity |
SOC |
Dec 02, 2019 |
1944 |
- |
| CrowdStrike Falcon® Scores 100% Protection in AV-Comparatives Real-World Protection Test (March-April 2021) |
DarkSide |
Dec 02, 2019 |
1775 |
- |
| CrowdStrike VP of Technology Strategy Offers Four Cyber Threat Predictions for 2020 |
- |
Dec 02, 2019 |
1912 |
- |
| CrowdStrike Researchers Automate Zero-Day Malware Classification for More Effective Threat Mitigation |
VirusTotal |
Dec 02, 2019 |
4143 |
- |
| CrowdStrike on Dark Reading: Why “Breakout Time” Is Critical to Your Security Strategy |
CrowdStrike Director |
Dec 02, 2019 |
1439 |
- |
| Data Science & Machine Learning 101: Hunting the Unknown |
- |
Dec 02, 2019 |
1525 |
- |
| Welcome to Fal.Con 2023: CrowdStrike Ushers in the Future of Cybersecurity |
Charlotte |
Dec 02, 2019 |
2505 |
- |
| Relentless Threat Activity Puts Identities in the Crosshairs |
- |
Dec 02, 2019 |
2144 |
- |
| Ransomware Actors Evolved Their Operations in 2020 |
CrowdStrike |
Dec 02, 2019 |
2712 |
- |
| Three Ways to Enhance Your Cloud Security with External Attack Surface Management |
CrowdStrike Falcon Surface |
Dec 02, 2019 |
2363 |
- |
| CrowdStrike Falcon Platform Achieves Certification in AV-Comparatives' First Anti-Tampering Test |
- |
Dec 02, 2019 |
1790 |
- |
| Falcon OverWatch Threat Hunting Contributes to Seamless Protection Against Novel BlackCat Attack |
BlackCat |
Dec 02, 2019 |
2818 |
- |
| CrowdStrike Redefines True XDR With Humio Acquisition |
Humio |
Dec 02, 2019 |
2706 |
- |
| CrowdStrike Partners with MITRE CTID to Identify Adversaries Using Cloud Analytics |
CrowdStrike |
Dec 02, 2019 |
2373 |
- |
| Don’t Get Schooled: Understanding the Threats to the Academic Industry |
CrowdStrike |
Dec 02, 2019 |
3325 |
- |
| Falcon OverWatch Elite in Action: Tailored Threat Hunting Services Provide Individualized Care and Support |
OverWatch |
Dec 02, 2019 |
2007 |
- |
| CrowdStrike Falcon®: First Endpoint Protection to Integrate Firmware Attack Detection Capability |
AlexI |
Dec 02, 2019 |
1861 |
- |
| The Call Is Coming from Inside the House: CrowdStrike Identifies Novel Exploit in VOIP Appliance |
Falcon Complete |
Dec 02, 2019 |
2794 |
- |
| New Tiered Program for CrowdStrike Partners Accelerates Resale Opportunities |
- |
Dec 02, 2019 |
1459 |
- |
| Zero Trust Integrations Are Expanding in the CrowdStrike Partner Ecosystem |
- |
Dec 02, 2019 |
2161 |
- |
| CrowdStrike Services Helps Organizations Prioritize Patching Vulnerabilities with CrowdStrike Falcon Spotlight |
CVSS |
Dec 02, 2019 |
3115 |
- |
| Porter Airlines Consolidates Its Cloud, Identity and Endpoint Security with CrowdStrike |
CrowdStrike |
Dec 02, 2019 |
2447 |
- |
| The Anatomy of Wiper Malware, Part 4: Less Common “Helper” Techniques |
- |
Dec 02, 2019 |
3093 |
- |
| How to Set Yourself Up for Real XDR Success |
Repurposed Point Products
Selecting |
Dec 02, 2019 |
2169 |
- |
| CrowdStrike Unveils AI Innovations to Expedite Security Operations and Upgrade the Analyst Experience |
CrowdStrike Signal
Yet |
Dec 02, 2019 |
2388 |
- |
| CrowdStrike and Intel Corporation: Addressing the Threat Landscape Today, Tomorrow and Beyond |
Intel |
Dec 02, 2019 |
2164 |
- |
| OverWatch Exposes AQUATIC PANDA in Possession of Log4Shell Exploit Tools During Hands-on Intrusion Attempt |
OverWatch
The |
Dec 02, 2019 |
2194 |
- |
| March 2023 Patch Tuesday: 9 Critical CVEs, Including Two Actively Exploited Zero Days |
Extended Support Updates |
Dec 02, 2019 |
2354 |
- |
| How Humio Leverages Kafka and Brute-force Search to Get Blazing-fast Search Results |
- |
Dec 02, 2019 |
2399 |
- |
| CrowdStrike CTO Talks Adversaries, Resiliency and More for RSA Conference 2021 |
- |
Dec 02, 2019 |
1343 |
- |
| CrowdStrike Services Offers Incident Response Tracker for the DFIR Community |
ALL |
Dec 02, 2019 |
2809 |
- |
| Microsoft's Incomplete Patch: Ongoing PrintNightmare for CVE-2021-1675, CVE-2021-34527 |
- |
Dec 02, 2019 |
1725 |
- |
| Kovter Killer: How to Remediate the APT of Clickjacking |
- |
Dec 02, 2019 |
2690 |
- |
| DarkSide Goes Dark: How CrowdStrike Falcon Customers Were Protected |
CrowdStrike |
Dec 02, 2019 |
2108 |
- |
| WIZARD SPIDER Adds New Features to Ryuk for Targeting Hosts on LAN |
WIZARD SPIDER |
Dec 02, 2019 |
1698 |
- |
| Double Trouble: Ransomware with Data Leak Extortion, Part 2 |
PINCHY SPIDER |
Dec 02, 2019 |
2840 |
- |
| Shut the Door: Guarding Against SonicWall GMS Remote Code Execution (CVE-2021-20020) |
- |
Dec 02, 2019 |
2616 |
- |
| Cloudy with a Chance of Unclear Mailbox Sync: CrowdStrike Services Identifies Logging Inconsistencies in Microsoft 365 |
- |
Dec 02, 2019 |
2502 |
- |
| CrowdStrike Falcon® Detects 100% of Attacks in New SE Labs EDR Test, Winning Highest Rating |
- |
Dec 02, 2019 |
2214 |
- |
| CrowdStrike’s Advanced Memory Scanning Stops Threat Actor Using BRc4 at Telecommunications Customer |
EDR |
Dec 02, 2019 |
2176 |
- |
| An In-Depth Analysis of Samsam Ransomware and BOSS SPIDER |
CrowdStrike |
Dec 02, 2019 |
4704 |
- |
| Ransomware (R)evolution Plagues Organizations, But CrowdStrike Protection Never Wavers |
DarkSide |
Dec 02, 2019 |
2631 |
- |
| Six Tips for Securing Privileged Accounts in the Enterprise |
- |
Dec 02, 2019 |
1629 |
- |
| CrowdStrike Signal Transforms AI-Powered Threat Detection |
CrowdStrike Signal
Born |
Dec 02, 2019 |
1763 |
- |
| Cybersecurity in the Time of COVID-19: Keys to Embracing (and Securing) a Remote Workforce |
- |
Dec 02, 2019 |
2478 |
- |
| CrowdStrike Joins the MITRE Engenuity Center for Threat-Informed Defense’s “Summiting the Pyramid” Research Project to Make Analytics More Robust |
CrowdStrike |
Dec 02, 2019 |
2185 |
- |
| CrowdStrike Extends Identity Security Innovations to Protect Customers and Stop Breaches |
- |
Dec 02, 2019 |
2187 |
- |
| When Tabletop Exercises Become Real-World Events |
EKaplan |
Dec 02, 2019 |
1837 |
- |
| IR Team Investigations Uncover eCrime Use of Nation-State Attack Methods |
- |
Dec 02, 2019 |
1940 |
- |
| Securing the Application Lifecycle with Scale and Speed: Achieving Holistic Workload Security with CrowdStrike and Nutanix |
- |
Dec 02, 2019 |
1635 |
- |
| Under Attack: Protecting Against Conti, DarkSide, REvil and Other Ransomware |
CrowdStrike Services |
Dec 02, 2019 |
3249 |
- |
| Do You Know What’s Hiding in Your Containers? |
Enterprise Strategy Group |
Dec 02, 2019 |
1911 |
- |
| Elevating Identity Security at Fal.Con 2024 |
ITDR02 |
Dec 02, 2019 |
2089 |
- |
| Malicious Inauthentic Falcon Crash Reporter Installer Delivers LLVM-Based Mythic C2 Agent Named Ciro |
- |
Dec 02, 2019 |
2757 |
- |
| Why North Korean Cyberwarfare is Likely to Intensify |
CrowdStrike VP |
Dec 02, 2019 |
2012 |
- |
| June 2021 Patch Tuesday: Six Actively Exploited Zero-Day Vulnerabilities and More Critical CVEs |
Microsoft |
Dec 02, 2019 |
2347 |
- |
| CrowdStrike Announces Falcon LogScale and Falcon Complete LogScale |
- |
Dec 02, 2019 |
1757 |
- |
| July 2023 Patch Tuesday: Six Actively Exploited Zero-Days and Nine Critical Vulnerabilities Identified |
Extended Support Updates |
Dec 02, 2019 |
2564 |
- |
| DLL Side-Loading: How to Combat Threat Actor Evasion Techniques |
- |
Dec 02, 2019 |
2522 |
- |
| Red Flag Alert: Service Accounts Performing Interactive Logins |
- |
Dec 02, 2019 |
2145 |
- |
| Optimizing an Elm Library |
- |
Dec 02, 2019 |
2695 |
- |
| Building the Modern SOC: How CrowdStrike Deployed Next-Gen SIEM to Increase Search Speed by 150x and Find Issues in Seconds |
- |
Dec 02, 2019 |
2185 |
- |
| Enterprise Remediation with CrowdStrike and MOXFIVE, Part 2: Strategies for Containing and Recovering |
- |
Dec 02, 2019 |
4034 |
- |
| The Wand Is Only as Good as the Magician: Getting the Most From Prevention Tools |
CrowdStrike CSO |
Dec 02, 2019 |
2083 |
- |
| CrowdStrike Ranked #1 in the IDC Worldwide Endpoint Security Market Shares Report for Third Time in a Row |
SE Labs |
Dec 02, 2019 |
2097 |
- |
| New Apps in the CrowdStrike Store Expand Value for Customers |
- |
Dec 02, 2019 |
2254 |
- |
| Leveraging the Dark Side: How CrowdStrike Boosts Machine Learning Efficacy Against Adversaries |
Emotet |
Dec 02, 2019 |
2617 |
- |
| Peering Around the Corner |
AdamM |
Dec 02, 2019 |
2012 |
- |
| Video Highlights the 4 Key Steps to Successful Incident Response |
- |
Dec 02, 2019 |
1677 |
- |
| Defend Against Ransomware and Malware with Falcon Fusion and Falcon Real Time Response |
- |
Dec 02, 2019 |
2358 |
- |
| CrowdStrike Teams with the MITRE Engenuity Center for Threat-Informed Defense to Develop ATT&CK Defense for IaaS |
CrowdStrike |
Dec 02, 2019 |
2610 |
- |
| Next-Gen Identity Security |
CrowdStrike |
Dec 02, 2019 |
3860 |
- |
| TellYouThePass Ransomware Analysis Reveals a Modern Reinterpretation Using Golang |
- |
Dec 02, 2019 |
3056 |
- |
| The Myth of Part-time Hunting, Part 1: The Race Against Ever-diminishing Breakout Times |
OverWatch |
Dec 02, 2019 |
2465 |
- |
| Enterprise Remediation with CrowdStrike and MOXFIVE, Part 1: Five Tips for Preparing and Planning |
CrowdStrike |
Dec 02, 2019 |
2458 |
- |
| Free Community Tool: CrowdInspect |
Robin |
Dec 02, 2019 |
2089 |
- |
| Critical Vulnerabilities in NTLM Allow Remote Code Execution and Cloud Resources Compromise |
Preempt |
Dec 02, 2019 |
1673 |
- |
| CrowdStrike Scores 100% in SE Labs Q2 2023 Enterprise Advanced Security Detection Test, Wins AAA Award |
SE Labs |
Dec 02, 2019 |
2374 |
- |
| March 2022 Patch Tuesday: Critical Microsoft Exchange Bug and Three Zero-day Vulnerabilities |
Microsoft |
Dec 02, 2019 |
2510 |
- |
| WannaMine Cryptomining: Harmless Nuisance or Disruptive Threat? |
WannaCry |
Dec 02, 2019 |
2966 |
- |
| CrowdStrike Changes Designation of Principal Executive Office to Austin, Texas |
- |
Dec 02, 2019 |
1270 |
- |
| CrowdStrike Enhances Cloud Asset Visualization to Accelerate Risk Prioritization |
- |
Dec 02, 2019 |
2010 |
- |
| Go Beyond Today’s Cybersecurity at Fal.Con 2020 |
- |
Dec 02, 2019 |
2085 |
- |
| Seven Key Ingredients of Incident Response to Reduce the Time and Cost of Recovery |
- |
Dec 02, 2019 |
1868 |
- |
| Helping Non-Security Stakeholders Understand ATT&CK in 10 Minutes or Less [VIDEO] |
- |
Dec 02, 2019 |
1452 |
- |
| Introducing The Nest, by Humio |
Humio |
Dec 02, 2019 |
1438 |
- |
| How Well Do You Know Your Attack Surface? Five Tips to Reduce the Risk of Exposure |
- |
Dec 02, 2019 |
2399 |
- |
| Defining the Value of Machine Learning for Endpoint Protection |
- |
Dec 02, 2019 |
1440 |
- |
| Falcon Complete for Service Providers: New Program Expands Access to Market-Leading MDR Service |
CrowdStrike |
Dec 02, 2019 |
1732 |
- |
| Improving Performance and Reliability of Internal Communication Among Microservices: The Story Behind the Falcon Sandbox Team’s gRPC Journey |
- |
Dec 02, 2019 |
2903 |
- |
| A Principled Approach to Monitoring Streaming Data Infrastructure at Scale |
Burrow |
Dec 02, 2019 |
2598 |
- |
| Decrypting NotPetya/Petya: Tools for Recovering Your MFT After an Attack |
NotPetya |
Dec 02, 2019 |
3556 |
- |
| Using Humio Log Management as the Heart of a SIEM |
- |
Dec 02, 2019 |
1584 |
- |
| Meet CrowdStrike’s Adversary of the Month for July: WICKED SPIDER |
AdamM |
Dec 02, 2019 |
1545 |
- |
| Stopping GRACEFUL SPIDER: Falcon Complete’s Fast Response to Recent SolarWinds Serv-U Exploit Campaign |
CrowdStrike Intelligence |
Dec 02, 2019 |
3128 |
- |
| RSA Conference 2021: Action Recap |
CrowdStrike CTO Michael Sentonas |
Dec 02, 2019 |
1967 |
- |
| Monitoring Digital Experience to Stay Close to Customers: How Observability Can Transform Financial Services and Fintech |
Humio |
Dec 02, 2019 |
1877 |
- |
| CrowdStrike Launches New AI Security Services to Strengthen AI Security and SOC Readiness |
- |
Dec 02, 2019 |
1843 |
- |
| Managed Threat Hunting Meets the Challenge of the Tenacious Adversary |
CrowdStrike |
Dec 02, 2019 |
1695 |
- |
| September 2024 Patch Tuesday: Four Zero-Days and Seven Critical Vulnerabilities Amid 79 CVEs |
Extended Security Update |
Dec 02, 2019 |
2688 |
- |
| Mitigating USB Data Exfiltration with New Capabilities in Falcon Device Control |
- |
Dec 02, 2019 |
2134 |
- |
| CrowdStrike and Google Chrome: Building an Integrated Ecosystem to Secure Your Enterprise Using the Power of Log Management |
- |
Dec 02, 2019 |
1588 |
- |
| CrowdStrike Becomes a Publicly Traded Company |
- |
Dec 02, 2019 |
1701 |
- |
| CrowdStrike to Extend Zero Trust Protection to the Data Layer with Acquisition of SecureCircle |
CrowdStrike |
Dec 02, 2019 |
1984 |
- |
| CrowdStrike Recognized by Forrester as a Leader in Endpoint Security with the Highest Score in the Current Offering Category |
Forrester |
Dec 02, 2019 |
2014 |
- |
| Tales From the Cryptojacking Front Lines |
- |
Dec 02, 2019 |
2683 |
- |
| noPac Exploit: Latest Microsoft AD Flaw May Lead to Total Domain Compromise in Seconds |
Microsoft |
Dec 02, 2019 |
2019 |
- |
| Intelligence-led Rapid Recovery: Getting Back to Business Faster |
- |
Dec 02, 2019 |
1904 |
- |
| Top Threats You Need to Know to Defend Your Cloud Environment |
- |
Dec 02, 2019 |
1772 |
- |
| Unprecedented Announcement by FBI Implicates North Korea in Destructive Attacks |
FBI Implicates North Korea |
Dec 02, 2019 |
1573 |
- |
| Historic Partnership Between CrowdStrike, Dell and Secureworks Delivers True Next-Gen Security Without Complexity |
- |
Dec 02, 2019 |
1904 |
- |
| Index-Free Logging: Are Indexes Necessary — or Simply Overhead? |
- |
Dec 02, 2019 |
2477 |
- |
| CrowdStrike Named a Leader in 2024 Gartner® Magic Quadrant™ for Endpoint Protection Platforms |
Falcon |
Dec 02, 2019 |
2077 |
- |
| Active Exploitation Observed for Linux Kernel Privilege Escalation Vulnerability (CVE-2024-1086) |
- |
Dec 02, 2019 |
2106 |
- |
| CrowdStrike Expands Its Horizons in India with New Innovation and Development Center in Pune |
Pune University |
Dec 02, 2019 |
2068 |
- |
| CrowdStrike Simplifies Ingestion of High-Value Data into the Falcon Platform |
- |
Dec 02, 2019 |
1993 |
- |
| How to Shrink Your SOC’s Response Time With Workflows and Real Time Response |
- |
Dec 02, 2019 |
2106 |
- |
| CrowdStrike Participates in Center for Threat-Informed Defense OceanLotus Project, the First Public Adversary Emulation Plan Combining macOS and Linux |
CrowdStrike |
Dec 02, 2019 |
2041 |
- |
| Sakula Reloaded |
China |
Dec 02, 2019 |
2485 |
- |
| CrowdStrike Falcon® Detects Kernel Attacks Exploiting Vulnerable Dell Driver (CVE-2021-21551) |
Dell |
Dec 02, 2019 |
2009 |
- |
| Your Current Endpoint Security May Be Leaving You with Blind Spots |
- |
Dec 02, 2019 |
1916 |
- |
| Meeting the Need for Speed in the SOC |
- |
Dec 02, 2019 |
2301 |
- |
| CARBON SPIDER Embraces Big Game Hunting, Part 1 |
Symantec |
Dec 02, 2019 |
2793 |
- |
| Convolutional Neural Networks Are MALE Models for PE Malware |
Microsoft Windows |
Dec 02, 2019 |
4791 |
- |
| Compromised NPM Package Used in Supply Chain Attack: CrowdStrike Falcon® Customers Protected |
Falcon |
Dec 02, 2019 |
2211 |
- |
| Duck Hunting with Falcon Complete: Analyzing a Fowl Banking Trojan, Part 1 |
QakBot |
Dec 02, 2019 |
2821 |
- |
| Protecting the Software Supply Chain: Deep Insights into the CCleaner Backdoor |
Piriform |
Dec 02, 2019 |
3776 |
- |
| Threat Protection from Cloud to Ground: Unified Power of EDR with SaaS and Application Security |
TrueFort |
Dec 02, 2019 |
1978 |
- |
| Accelerate Troubleshooting, Forensics and Response With Fast and Efficient Search |
John Smith |
Dec 02, 2019 |
1733 |
- |
| How CrowdStrike Hunts, Identifies and Defeats Cloud-Focused Threats |
SCATTERED SPIDER |
Dec 02, 2019 |
2196 |
- |
| Exploiting GlobalProtect for Privilege Escalation, Part Two: Linux and macOS |
Palo Alto Networks |
Dec 02, 2019 |
3931 |
- |
| June 2022 Patch Tuesday: Three Critical CVEs and a Fix for the Follina Vulnerability |
- |
Dec 02, 2019 |
2923 |
- |
| CrowdStrike CEO Joins Power Panel Discussion with Zoom and Slack CEOs |
- |
Dec 02, 2019 |
1367 |
- |
| CrowdStrike Redefines Cybersecurity with New Falcon Platform Innovations to Deliver True Platform Consolidation |
Charlotte AI |
Dec 02, 2019 |
2021 |
- |
| Capture the Flag: CrowdStrike Intelligence Adversary Quest 2022 |
- |
Dec 02, 2019 |
1495 |
- |
| How to collect Microsoft Office 365 logs with O365beat |
- |
Dec 02, 2019 |
2183 |
- |
| Compromising Identity Provider Federation |
- |
Dec 02, 2019 |
3466 |
- |
| July 2025 Patch Tuesday: One Publicly Disclosed Zero-Day and 12 Critical Vulnerabilities Among 137 CVEs |
Extended Security Updates |
Dec 02, 2019 |
3073 |
- |
| eCriminals Share Ways to Impersonate School Staff to Steal Paychecks |
- |
Dec 02, 2019 |
1976 |
- |
| Google Cloud + CrowdStrike: Transforming Security With Cloud-scale Multi-level Defense |
- |
Dec 02, 2019 |
2064 |
- |
| Key Characteristics of Modern Fileless Attacks |
- |
Dec 02, 2019 |
1755 |
- |
| Investigating PowerShell: Command and Script Logging |
ChadT |
Dec 02, 2019 |
1818 |
- |
| CrowdStrike and EY Join Forces to Boost Organizational Resiliency |
- |
Dec 02, 2019 |
2110 |
- |
| How Fast Can You Grep? |
- |
Dec 02, 2019 |
2107 |
- |
| September 2021 Patch Tuesday: A Malicious MSHTML Zero-Day and Ongoing Critical CVEs |
Microsoft |
Dec 02, 2019 |
2505 |
- |
| To Our Customers and Partners |
- |
Dec 02, 2019 |
1366 |
- |
| Cloud Security Takes the Stage at Fal.Con 2024 |
- |
Dec 02, 2019 |
1942 |
- |
| Forrester Total Economic Impact™ Study Shows 316% ROI for CrowdStrike Falcon® |
Forrester |
Dec 02, 2019 |
2226 |
- |
| Still Alive: Updates for Well-Known Latin America eCrime Malware Identified in 2023 |
- |
Dec 02, 2019 |
4870 |
- |
| CrowdStrike Falcon Wins Best EDR Annual Security Award in SE Labs Evaluations |
CrowdStrike |
Dec 02, 2019 |
1774 |
- |
| Humio at Decisiv: An Industrial Internet of Things Company Reduces Log Management Costs by 37% |
- |
Dec 02, 2019 |
1905 |
- |
| January 2024 Patch Tuesday: 49 Vulnerabilities Disclosed on First Patch Tuesday of the Year |
Extended Support Updates |
Dec 02, 2019 |
1763 |
- |
| 4 Reasons Why Nonprofits Are a Target — and What You Need to Know About Cybersecurity |
SMBs |
Dec 02, 2019 |
2173 |
- |
| How to Augment or Replace Your SIEM with the CrowdStrike Falcon Platform |
Forrester |
Dec 02, 2019 |
2866 |
- |
| CrowdStrike Named a Leader in Frost & Sullivan’s 2022 Frost Radar for Cyber Threat Intelligence |
Frost |
Dec 02, 2019 |
2102 |
- |
| How Defenders Can Hunt for Malicious JScript Executions: A Perspective from OverWatch Elite |
Microsoft |
Dec 02, 2019 |
2454 |
- |
| Falcon Spotlight Is Changing the Game: Vulnerability Management With Ever-Adapting AI |
- |
Dec 02, 2019 |
2335 |
- |
| Chip Flaws Spectre and Meltdown are Actually Three Vulnerabilities and Proving Hard to Mitigate |
Google |
Dec 02, 2019 |
2945 |
- |
| CrowdStrike Demonstrates Cloud Security Leadership at AWS re:Invent 2023 |
- |
Dec 02, 2019 |
2245 |
- |
| Leave No Blind Spot Unseen: Unified Endpoint and Network Detection and Response for Defense in Depth |
Zeek |
Dec 02, 2019 |
2557 |
- |
| CrowdStrike CEO George Kurtz in Forbes: Creating a Balanced Cybersecurity Portfolio |
- |
Dec 02, 2019 |
1590 |
- |
| CrowdStrike Announces $200 Million Series E Financing Round with New and Existing Investors |
General Atlantic |
Dec 02, 2019 |
1549 |
- |
| 7 Things to Know About Index-free Technology |
- |
Dec 02, 2019 |
2068 |
- |
| Detecting Poisoned Python Packages: CTX and PHPass |
Attackers
In |
Dec 02, 2019 |
2102 |
- |
| NotPetya Technical Analysis - A Triple Threat: File Encryption, MFT Encryption, Credential Theft |
NotPetya |
Dec 02, 2019 |
4142 |
- |
| Memorizing Behavior: Experiments with Overfit Machine Learning Models |
- |
Dec 02, 2019 |
3251 |
- |
| Adversaries Go Hands-On in Japan: Know the Threat and Know the Solution |
Japan |
Dec 02, 2019 |
3288 |
- |
| CrowdStrike Mobile Threat Report Offers Trends and Recommendations for Securing Your Organization |
AdamM |
Dec 02, 2019 |
1973 |
- |
| OverWatch Threat Hunters Win the Race Against Carbanak in MITRE ATT&CK Evaluation |
Carbanak |
Dec 02, 2019 |
2687 |
- |
| Falcon Platform Prevents COOKIE SPIDER’s SHAMOS Delivery on macOS |
GraphExplorer |
Dec 02, 2019 |
2515 |
- |
| Putting “Cybersecurity First” Is Enabling and Essential for Business, CrowdStrike Leaders Say |
- |
Dec 02, 2019 |
2189 |
- |
| CrowdStrike Announces Falcon Identity Protection Innovations for Entra ID and Privileged Access |
- |
Dec 02, 2019 |
1977 |
- |
| CrowdStrike Discovers Use of 64-bit Zero-Day Privilege Escalation Exploit (CVE-2014-4113) by Hurricane Panda |
Hurricane Panda
October |
Dec 02, 2019 |
2277 |
- |
| How CrowdStrike Achieves Lightning-Fast Machine Learning Model Training with TensorFlow and Rust |
- |
Dec 02, 2019 |
3155 |
- |
| Improving CrowdStrike Falcon® Detection Content with the Gap Analysis Team |
RTFACT Detonation |
Dec 02, 2019 |
2008 |
- |
| Montage Health Consolidates Its Cybersecurity Strategy with CrowdStrike |
- |
Dec 02, 2019 |
1969 |
- |
| Four Key Factors When Selecting a Cloud Workload Protection Platform |
- |
Dec 02, 2019 |
1877 |
- |
| Adversaries Have Their Heads in Your Cloud |
Falcon OverWatch |
Dec 02, 2019 |
2759 |
- |
| Only the Transformational Will Survive |
- |
Dec 02, 2019 |
2014 |
- |
| Automate Your Cloud Operations With Humio and Fylamynt |
Fylamynt
The EC |
Dec 02, 2019 |
1967 |
- |
| 2022 Threat Hunting Report: Falcon OverWatch Looks Back to Prepare Defenders for Tomorrow’s Adversaries |
CrowdStrike Falcon |
Dec 02, 2019 |
1699 |
- |
| Technical Analysis of the WhisperGate Malicious Bootloader |
- |
Dec 02, 2019 |
1833 |
- |
| The Business Case for “Remote-First” |
CrowdStrike CTO Mike Sentonas |
Dec 02, 2019 |
2154 |
- |
| Unlocking SOC Superpowers: How Next-Gen SIEM Transforms Your Team |
- |
Dec 02, 2019 |
2446 |
- |
| CrowdStrike Falcon® Receives FedRAMP Authorization |
- |
Dec 02, 2019 |
1721 |
- |
| Security Advisory: MSRPC Printer Spooler Relay (CVE-2021-1678) |
CrowdStrike |
Dec 02, 2019 |
2504 |
- |
| CrowdStrike’s New Methodology for Tracking eCrime |
AdamM |
Dec 02, 2019 |
2189 |
- |
| Critical Vulnerability in CredSSP Allows Remote Code Execution on Servers Through MS-RDP |
Preempt |
Dec 02, 2019 |
1993 |
- |
| DarkSide Pipeline Attack Shakes Up the Ransomware-as-a-Service Landscape |
Babuk Locker |
Dec 02, 2019 |
3233 |
- |
| One Year of Falcon Go: Transforming Cybersecurity for Small Businesses |
NAB |
Dec 02, 2019 |
2130 |
- |
| Catching BloodHound Before It Bites |
- |
Dec 02, 2019 |
1945 |
- |
| CrowdStrike Intelligence - Adversary-based Approach |
AdamM |
Dec 02, 2019 |
1942 |
- |
| How Falcon OverWatch Spots Destructive Threats in MITRE Adversary Emulation |
OverWatch |
Dec 02, 2019 |
2222 |
- |
| Stellar Performances: How CrowdStrike Machine Learning Handles the SUNSPOT Malware |
- |
Dec 02, 2019 |
1358 |
- |
| March 2021 Patch Tuesday: More Microsoft Zero-Day Vulnerabilities and More CVEs |
Microsoft |
Dec 02, 2019 |
2116 |
- |
| How Falcon Horizon Ensures Secure Authentication to Customer Clouds |
CrowdStrike |
Dec 02, 2019 |
1957 |
- |
| CCleaner Stage 2: In-Depth Analysis of the Payload |
Corel |
Dec 02, 2019 |
4178 |
- |
| Falcon Next-Gen SIEM Integrates with Microsoft Edge for Business to Improve Enterprise Browser Security |
- |
Dec 02, 2019 |
1572 |
- |
| Proactively Secure Serverless Functions Across AWS, Google Cloud and Azure with Falcon Cloud Security |
CrowdStrike |
Dec 02, 2019 |
1973 |
- |
| CrowdStrike Partners with MITRE CTID, Reveals Real-world Insider Threat Techniques |
- |
Dec 02, 2019 |
1803 |
- |
| September 2022 Patch Tuesday: One Active Zero-Day and Five Critical CVEs |
CrowdStrike |
Dec 02, 2019 |
2255 |
- |
| CrowdStrike Integrated Intelligence and Deployment Automation Enhance New AWS Network Firewall |
- |
Dec 02, 2019 |
1767 |
- |
| Hypervisor Jackpotting, Part 1: CARBON SPIDER and SPRITE SPIDER Target ESXi Servers With Ransomware to Maximize Impact |
VMware |
Dec 02, 2019 |
3001 |
- |
| 3 Easy Steps for End-to-End XDR with CrowdStrike and Zscaler |
- |
Dec 02, 2019 |
1817 |
- |
| Interception: Dissecting BokBot’s “Man in the Browser” |
Hash
The |
Dec 02, 2019 |
6879 |
- |
| CrowdStrike’s One-Click Hunting Simplifies Threat Hunting for Security Teams |
CrowdStrike Counter Adversary Operations |
Dec 02, 2019 |
2413 |
- |
| 3 Tips for Operationalizing Cyber Intelligence |
AdamM |
Dec 02, 2019 |
1542 |
- |
| Cloud-based Security: Future of the Industry? |
- |
Dec 02, 2019 |
1544 |
- |
| CrowdStrike Unveils Exciting New Capabilities at RSA 2020 |
CrowdStrike |
Dec 02, 2019 |
2246 |
- |
| CrowdStrike Brings Industry-Leading ITDR to All Major Cloud-Based Identity Providers |
CrowdStrike |
Dec 02, 2019 |
1646 |
- |
| CrowdStrike Falcon® Go |
SE Labs |
Sep 22, 2025 |
1037 |
- |
| How Human Intelligence Is Supercharging CrowdStrike's Artificial Intelligence |
- |
Dec 02, 2019 |
2985 |
- |
| Maintaining Security Consistency from Endpoint to Workload and Everywhere in Between |
- |
Dec 02, 2019 |
1626 |
- |
| New Podcast Series: The Importance of Cyber Threat Intelligence in Cybersecurity |
Cybercrime Magazine |
Dec 02, 2019 |
2260 |
- |
| IMPERIAL KITTEN Deploys Novel Malware Families in Middle East-Focused Operations |
CompromiseIMPERIAL KITTEN |
Dec 02, 2019 |
3307 |
- |
| Saved by the Shell: Reconstructing Command-Line Activity on MacOS |
- |
Dec 02, 2019 |
2465 |
- |
| Who is REFINED KITTEN? |
AdamM |
Dec 02, 2019 |
1573 |
- |
| Detecting and Responding to Ransomware: How Logging Everything Helps Mitigate Ransomware Risks |
- |
Dec 02, 2019 |
1852 |
- |
| CrowdStrike Positioned as a Leader in Inaugural IDC MarketScape: Worldwide Modern Endpoint Security for Enterprise 2021 Vendor Assessment |
- |
Dec 02, 2019 |
1642 |
- |
| RSAC 2022: Introducing CrowdStrike Asset Graph — the Path to Proactive Security Posture Management |
Asset Graph
CrowdStrike Asset Graph |
Dec 02, 2019 |
2547 |
- |
| End-to-end Testing: How a Modular Testing Model Increases Efficiency and Scalability |
- |
Dec 02, 2019 |
2841 |
- |
| Unveiling CrowdStrike Falcon Surface: The Industry’s Most Complete Adversary-Driven External Attack Surface Management (EASM) Technology |
- |
Dec 02, 2019 |
2320 |
- |
| Lumma Stealer Packed with CypherIt Distributed Using Falcon Sensor Update Phishing Lure |
- |
Dec 02, 2019 |
2292 |
- |
| CrowdStrike “Dominates” in Endpoint Detection and Response |
- |
Dec 02, 2019 |
2307 |
- |
| Bird’s-Eye View of Fal.Con 2020 |
- |
Dec 02, 2019 |
2043 |
- |
| Another Brick in the Wall: eCrime Groups Leverage SonicWall VPN Vulnerability |
SonicWallCrowdStrike Intelligence |
Dec 02, 2019 |
2668 |
- |
| Through the Window: Creative Code Invocation |
XOR |
Dec 02, 2019 |
2415 |
- |
| June 2024 Patch Tuesday: 51 Vulnerabilities Addressed Including One Critical and One Zero-Day |
Extended Security Update |
Dec 02, 2019 |
1752 |
- |
| Blocking Fileless Script-based Attacks Using CrowdStrike Falcon®'s Script Control Feature |
MUMMY SPIDER |
Dec 02, 2019 |
2488 |
- |
| VirusTotal Lookups Are Back in CrowdInspect, CrowdStrike’s Popular Free Tool |
Robin |
Dec 02, 2019 |
1589 |
- |
| Vendor Hype Gives New Meaning to the Term “Zero Trust Security” (And Not in a Good Way) |
- |
Dec 02, 2019 |
2997 |
- |
| Preventing Exploitation of the ZIP File Format |
ZIP |
Dec 02, 2019 |
2625 |
- |
| Mo' Shells Mo' Problems - Deep Panda Web Shells |
RyanJ |
Dec 02, 2019 |
2789 |
- |
| Unveiling the CrowdStrike Marketplace: A Powerful Ecosystem to Meet Unique Cybersecurity Needs |
CrowdStrike |
Dec 02, 2019 |
1602 |
- |
| The Anatomy of Wiper Malware, Part 3: Input/Output Controls |
DriveSlayer |
Dec 02, 2019 |
2400 |
- |
| Do You Think SMBs Are Safe From Cyberattacks? Think Again |
- |
Dec 02, 2019 |
1929 |
- |
| Likely eCrime Actor Uses Filenames Capitalizing on July 19, 2024, Falcon Sensor Content Issues in Operation Targeting LATAM-Based CrowdStrike Customers |
- |
Dec 02, 2019 |
1519 |
- |
| Data Protection Day 2022: To Protect Privacy, Remember Security |
COVID |
Dec 02, 2019 |
1925 |
- |
| Press #1 to Play: A Look Into eCrime Menu-style Toolkits |
Sophos |
Dec 02, 2019 |
3403 |
- |
| Programs Hacking Programs: How to Extract Memory Information to Spot Linux Malware |
- |
Dec 02, 2019 |
3473 |
- |
| Our 6 Key Takeaways from the 2024 Gartner® Market Guide for Cloud-Native Application Protection Platforms |
Gartner |
Dec 02, 2019 |
2795 |
- |
| CrowdStrike Statement on Bloomberg’s October 25, 2024 Story |
CrowdStrike |
Dec 02, 2019 |
1348 |
- |
| How a Generalized Validation Testing Approach Improves Efficiency, Boosts Outcomes and Streamlines Debugging |
- |
Dec 02, 2019 |
2791 |
- |
| Five Reasons Why Legacy Data Loss Prevention Tools Fail to Deliver |
- |
Dec 02, 2019 |
2091 |
- |
| CrowdStrike Delivers Protection for Critical Windows Certificate Spoofing Vulnerability |
- |
Dec 02, 2019 |
1841 |
- |
| The Fal.Con for Public Sector Conference Is On Demand With Recommendations for Securing Your Remote Workforce |
- |
Dec 02, 2019 |
2087 |
- |
| Falcon LogScale Users Gain Better Threat Hunting with Chrome Enterprise Security Telemetry |
- |
Dec 02, 2019 |
1502 |
- |
| CrowdStrike Services Offers Incident Response Executive Preparation Checklist |
- |
Dec 02, 2019 |
1869 |
- |
| Adversary Quest 2022 Walkthrough, Part 2: Four TABLOID JACKAL Challenges |
TABLOID JACKAL |
Dec 02, 2019 |
4778 |
- |
| CrowdStrike Falcon® Offers Plug-and-Play Integration with ServiceNow |
- |
Dec 02, 2019 |
1591 |
- |
| Shining a Light on DarkOxide |
- |
Dec 02, 2019 |
2118 |
- |
| Forrester Names CrowdStrike a Leader in the 2021 Wave for External Threat Intelligence |
CrowdStrike CROWDSTRIKE FALCON |
Dec 02, 2019 |
2119 |
- |
| Security in Sweatpants: Embracing Remote Workers via Zero Trust |
- |
Dec 02, 2019 |
2250 |
- |
| New Ransomware Variant Uses Golang Packer |
CrowdStrike Intelligence |
Dec 02, 2019 |
1829 |
- |
| BadRabbit MS17-010 Exploitation Part One: Leak and Control |
BadRabbit |
Dec 02, 2019 |
5393 |
- |
| CrowdStrike 2025 Threat Hunting Report: AI Becomes a Weapon and a Target |
- |
Dec 02, 2019 |
1885 |
- |
| NotPetya Technical Analysis Part II: Further Findings and Potential for MBR Recovery |
Trans |
Dec 02, 2019 |
2968 |
- |
| CrowdStrike Launches SEC Readiness Services to Prepare Boardrooms for New Regulations |
- |
Dec 02, 2019 |
1789 |
- |
| Vulnerability Roundup: 10 Critical CVEs of 2020 |
CrowdStrike |
Dec 02, 2019 |
2253 |
- |
| Achieving Ecosystem-level Cybersecurity: A U.S. Policy Perspective |
CISA |
Dec 02, 2019 |
2694 |
- |
| A Primer on Machine Learning in Endpoint Security |
- |
Dec 02, 2019 |
2170 |
- |
| Surgeon with a Shotgun! - Memory Forensics |
DevinGergen |
Dec 02, 2019 |
2016 |
- |
| Falcon Complete Hub Turns MDR Visibility into Action |
- |
Dec 02, 2019 |
1813 |
- |
| Spectra Alliance’s Strategic Approach to Zero Trust Adoption |
ESG |
Dec 02, 2019 |
2101 |
- |
| Malware Analysis in the Modern SOC |
MSBuild |
Dec 02, 2019 |
2382 |
- |
| So You Think Your Containers Are Secure? Four Steps to Ensure a Secure Container Deployment |
- |
Dec 02, 2019 |
1956 |
- |
| CrowdStrike Falcon OverWatch Insights: 8 LOLBins Every Threat Hunter Should Know |
LOLBin |
Dec 02, 2019 |
1645 |
- |
| CrowdStrike Releases New Update To Falcon Orchestrator |
Falcon Host |
Dec 02, 2019 |
1495 |
- |
| Seven ways to think about observability |
- |
Dec 02, 2019 |
1801 |
- |
| IDC MarketScape Names CrowdStrike Falcon® a “Leader” for Endpoint STAP |
- |
Dec 02, 2019 |
1748 |
- |
| The Security Compromise that Comes with Windows 10 End of Support |
Microsoft |
Dec 02, 2019 |
2289 |
- |
| Falcon OverWatch Threat Hunting Report Finds an Increase in eCrime as Adversaries Mature Their Skills |
Falcon |
Dec 02, 2019 |
2347 |
- |
| CSO Australia: How Nation-State Cyber Wars Increase Business Risk |
David Braue |
Dec 02, 2019 |
1561 |
- |
| CrowdStrike Defends Against Azure Cross-Tenant Synchronization Attacks |
Microsoft |
Dec 02, 2019 |
3407 |
- |
| CrowdStrike Partners with Box to Add Automated Protections Against Security Breaches and Data Loss |
Forrester |
Dec 02, 2019 |
1888 |
- |
| Cyber Insurance Is Not a Substitute for Cybersecurity |
CrowdStrike |
Dec 02, 2019 |
2198 |
- |
| CrowdStrike Falcon® for AWS — The Faster, Easier, More Effective Way to Protect Cloud Workloads |
- |
Dec 02, 2019 |
2059 |
- |
| Essential Considerations When Choosing a DSPM Solution |
- |
Dec 02, 2019 |
2190 |
- |
| Leftover Lunch: Finding, Hunting and Eradicating Spicy Hot Pot, a Persistent Browser Hijacking Rootkit |
Spicy Hot Pot
Comparing |
Dec 02, 2019 |
4626 |
- |
| Trying to Dance the Samba: An Exercise in Weaponizing Vulnerabilities |
Samba |
Dec 02, 2019 |
7085 |
- |
| Adversary Extends Persistence by Modifying System Binaries |
Modifying System Binaries
December |
Dec 02, 2019 |
1517 |
- |
| Take Your Endpoint Security to New Heights at Fal.Con 2024 |
- |
Dec 02, 2019 |
1905 |
- |
| Falcon for IT Redefines Vulnerability Management with Risk-based Patching |
- |
Dec 02, 2019 |
1999 |
- |
| August 2025 Patch Tuesday: One Publicly Disclosed Zero-Day and 13 Critical Vulnerabilities Among 107 CVEs |
Extended Security Updates |
Dec 02, 2019 |
3554 |
- |
| CrowdStrike Delivers a Trifecta of New Products and Features: CrowdStrike Falcon® Intelligence, EPP Complete and Major Enhancements to Falcon Insight |
- |
Dec 02, 2019 |
2456 |
- |
| ’Tis the Season for eCrime |
- |
Dec 02, 2019 |
2289 |
- |
| The Pernicious Effects of Ransomware |
EKaplan |
Dec 02, 2019 |
2108 |
- |
| To Get Cloud Security Cooking, You Need The Right Recipe For Success |
IDC |
Dec 02, 2019 |
1884 |
- |
| Squashing SPIDERS: Threat Intelligence, Threat Hunting and Rapid Response Stops SQL Injection Campaign |
CARBON SPIDER |
Dec 02, 2019 |
2621 |
- |
| Walking Through Walls: Four Common Endpoint Tools Used to Facilitate Covert C2 |
Falcon OverWatch Elite |
Dec 02, 2019 |
2717 |
- |
| At RSA 2020, CrowdStrike Wins SC Media Excellence Award for Best Security Company |
SC Magazine |
Dec 02, 2019 |
2589 |
- |
| CrowdStrike a “Customers’ Choice” — Received One of the Highest Ratings in 2023 Gartner® Peer Insights™ Voice of the Customer for Endpoint Protection Platform Report |
Gartner |
Dec 02, 2019 |
2277 |
- |
| Cutwail Spam Campaign Uses Steganography to Distribute URLZone |
Falcon Intelligence |
Dec 02, 2019 |
2130 |
- |
| How to Easily Bypass EPA to Compromise Any Web Server that Supports Windows Integrated Authentication |
Microsoft |
Dec 02, 2019 |
1619 |
- |
| VENOM Vulnerability Details |
- |
Dec 02, 2019 |
1986 |
- |
| Nowhere to Hide: Detecting SILENT CHOLLIMA’s Custom Tooling |
- |
Dec 02, 2019 |
1964 |
- |
| Naming Adversaries and Why It Matters to Your Security Team |
MITRE |
Dec 02, 2019 |
2339 |
- |
| Mitigating Bash ShellShock |
DevinGergen |
Dec 02, 2019 |
3021 |
- |
| October 2021 Patch Tuesday: Active Zero-Day Exploit for Windows PC, and Critical CVEs for Hyper-V and Spooler Service |
Microsoft |
Dec 02, 2019 |
2371 |
- |
| Falcon OverWatch Threat Hunting Uncovers Ongoing NIGHT SPIDER Zloader Campaign |
User |
Dec 02, 2019 |
2180 |
- |
| Falcon FileVantage: New CrowdStrike File Integrity Monitoring Solution Creates Total Efficiency for SecOps |
- |
Dec 02, 2019 |
1741 |
- |
| 4 Key Factors to Consider When Protecting Your Cloud Workloads |
- |
Dec 02, 2019 |
2625 |
- |
| Development Cost of Porting TensorFlow Models to Pure Rust |
GPUs |
Dec 02, 2019 |
2759 |
- |
| July 2022 Patch Tuesday: Four Critical CVEs and a Zero-Day Bug Under Active Exploitation |
- |
Dec 02, 2019 |
2411 |
- |
| Why IT Hygiene is Critical to Your Cybersecurity Readiness |
- |
Dec 02, 2019 |
1986 |
- |
| Falcon Next-Gen Identity Security Unifies Protection Across All Identities and Domains |
- |
Dec 02, 2019 |
1842 |
- |
| SCATTERED SPIDER Exploits Windows Security Deficiencies with Bring-Your-Own-Vulnerable-Driver Tactic in Attempt to Bypass Endpoint Security |
SCATTERED SPIDER |
Dec 02, 2019 |
2684 |
- |
| CrowdStrike Store Partners: Committed to Securing Your Remote Workforce |
CrowdStrike Store |
Dec 02, 2019 |
2378 |
- |
| RSA 2015 Hacking Exposed: CrowdResponse Update Released |
Robin |
Dec 02, 2019 |
2188 |
- |
| Falcon Insight for ChromeOS: The Industry’s First Native XDR Offering for ChromeOS |
ChromeOS |
Dec 02, 2019 |
1708 |
- |
| Hypervisor Jackpotting, Part 2: eCrime Actors Increase Targeting of ESXi Servers with Ransomware |
VMware |
Dec 02, 2019 |
2537 |
- |
| Adversary Quest 2021 Walkthrough, Part 3: Four PROTECTIVE PENGUIN Challenges |
- |
Dec 02, 2019 |
5046 |
- |
| CrowdStrike Delivers Adversary-Focused, Platform Approach to CNAPP and Cloud Security |
- |
Dec 02, 2019 |
2285 |
- |
| Investment Banking Firm Greenhill Uses Falcon Complete to Protect Global Clients’ Data |
- |
Dec 02, 2019 |
1348 |
- |
| Black Hat 2021: Join Us Virtually or In Person |
Booth |
Dec 02, 2019 |
2243 |
- |
| November 2023 Patch Tuesday: 58 Vulnerabilities Including Three Actively Exploited Zero-Days |
Extended Support Updates |
Dec 02, 2019 |
2015 |
- |
| BitPaymer Source Code Fork: Meet DoppelPaymer Ransomware and Dridex 2.0 |
INDRIK SPIDER |
Dec 02, 2019 |
3908 |
- |
| CrowdStrike Stops GenAI Data Leaks with Unified Data Protection |
Charlotte AI |
Dec 02, 2019 |
2474 |
- |
| Top 6 financial services log management use cases |
- |
Dec 02, 2019 |
2059 |
- |
| Falcon Complete Disrupts Malvertising Campaign Targeting AnyDesk |
Inde |
Dec 02, 2019 |
2903 |
- |
| How a Strong Identity Protection Strategy Can Accelerate Your Cyber Insurance Initiatives |
CrowdStrike |
Dec 02, 2019 |
2252 |
- |
| CrowdStrike Named a Leader in IDC MarketScape for Worldwide MDR |
Frost |
Dec 02, 2019 |
2240 |
- |
| CrowdStrike Achieves FedRAMP® JAB High “Ready” Designation |
- |
Dec 02, 2019 |
2231 |
- |
| Unlock Advanced Security Automation for Next-Gen SIEM |
Falcon Next |
Dec 02, 2019 |
2357 |
- |
| Stop Cloud Breaches With Threat Graph Cloud-Powered Analytics: Intelligent, Automated, Accurate |
Threat Graph |
Dec 02, 2019 |
1939 |
- |
| Threat Hunting Uncovers More Intrusions Against Healthcare in Midst of COVID-19 Pandemic |
CrowdStrike CTO Mike Sentonas |
Dec 02, 2019 |
3202 |
- |
| CrowdStrike Named a Strong Performer in 2022 Forrester Wave for Cloud Workload Security |
CrowdStrike |
Dec 02, 2019 |
1912 |
- |
| How to Sniff Out (and Block) BloodHound Attacks |
- |
Dec 02, 2019 |
1841 |
- |
| Playing Hide-and-Seek with Ransomware, Part 1 |
Microsoft Visual Studio |
Dec 02, 2019 |
3712 |
- |
| Small Business Cyberattack Analysis: Most-Targeted SMB Sectors and Key Prevention Tips |
TechValidate |
Dec 02, 2019 |
2831 |
- |
| CrowdStrike Falcon®'s Autonomous Detection and Prevention Wins Best EDR Award and Earns Another AAA Rating in SE Labs Evaluations |
- |
Dec 02, 2019 |
1989 |
- |
| CrowdStrike Named a Leader in The Forrester Wave™: Managed Detection and Response Services in Europe, Q3 2025 |
CrowdStrike |
Dec 02, 2019 |
1782 |
- |
| Engineering & Tech |
CrowdStrike |
Dec 02, 2019 |
5156 |
- |
| CrowdStrike Provides Free Dashboard to Identify Vulnerable Macs |
Kevin Backhouse |
Dec 02, 2019 |
1796 |
- |
| Weeding out WannaMine v4.0: Analyzing and Remediating This Mineware Nightmare |
SVCHOST |
Dec 02, 2019 |
3591 |
- |
| November 2021 Patch Tuesday: Two Active Zero-Days and Four Publicly Disclosed CVEs |
Microsoft |
Dec 02, 2019 |
2305 |
- |
| August 2023 Patch Tuesday: Two Actively Exploited Zero-Days and Six Critical Vulnerabilities Addressed |
Extended Support Updates |
Dec 02, 2019 |
1950 |
- |
| Registry Analysis with CrowdResponse |
ChadT |
Dec 02, 2019 |
2396 |
- |
| Key Trends From the CrowdStrike 2019 Global Threat Report |
CrowdStrike Intelligence |
Dec 02, 2019 |
1910 |
- |
| CrowdStrike, Intel and Dell: Clustering and Similarity Assessment for AI-driven Endpoint Security with Intel NPU Acceleration |
CrowdStrike |
Dec 02, 2019 |
3646 |
- |
| Better Together: The Power of Managed Cybersecurity Services in the Face of Pressing Global Security Challenges |
BITWISE SPIDER |
Dec 02, 2019 |
2629 |
- |
| CrowdStrike Protects Against NotPetya Attack |
WannaCry |
Dec 02, 2019 |
2105 |
- |
| CrowdStrike Announces Two New Programs to Help Organizations Secure Remote Workers During COVID-19 Crisis |
COVID |
Dec 02, 2019 |
1927 |
- |
| CrowdStrike Named a Strong Performer in Forrester Wave for Unified Vulnerability Management |
CrowdStrike |
Dec 02, 2019 |
2215 |
- |
| Are You More Interested in Stopping a Breach or Stopping Malware? |
- |
Dec 02, 2019 |
1641 |
- |
| Hacking Farm to Table: Threat Hunters Uncover Rise in Attacks Against Agriculture |
OverWatch |
Dec 02, 2019 |
3582 |
- |
| CrowdStrike Provides Spectre-Meltdown Dashboard to Help Customers Mitigate CPU Flaws |
Falcon |
Dec 02, 2019 |
1496 |
- |
| CrowdStrike Webcast with Mercedes-AMG Petronas Motorsport Focuses on the Need for Speed in Cybersecurity |
- |
Dec 02, 2019 |
2437 |
- |
| CrowdStrike Named Overall Leader in Industry’s First ITDR Comparative Report |
- |
Dec 02, 2019 |
1902 |
- |
| Prescription for Protection: Healthcare Industry Observations from CrowdStrike Investigations |
CrowdStrike Services |
Dec 02, 2019 |
2766 |
- |
| Exploiting CVE-2021-3490 for Container Escapes |
CrowdStrike |
Dec 02, 2019 |
3495 |
- |
| CrowdStrike and Industry Partners Release Open Cybersecurity Schema Framework |
AWS |
Dec 02, 2019 |
2039 |
- |
| CrowdStrike Receives Highest Overall Score in the 2018 Gartner Peer Insights Customers’ Choice for EPP |
- |
Dec 02, 2019 |
2377 |
- |
| Advanced Falconry: Seeking Out the Prey with Machine Learning |
- |
Dec 02, 2019 |
2662 |
- |
| Join CrowdStrike at the Black Hat 2020 Virtual Event |
- |
Dec 02, 2019 |
1964 |
- |
| If Agencies Aren’t Threat Hunting, They’re Failing |
- |
Dec 02, 2019 |
1876 |
- |
| CrowdStrike Falcon® Intelligence Recon: Mitigating Digital Risk on the Deep, Dark Web and Beyond |
- |
Dec 02, 2019 |
1861 |
- |
| How to Mature Your Threat Intelligence Program |
- |
Dec 02, 2019 |
2013 |
- |
| CrowdStrike Debuts Counter Adversary Operations Team to Fight Faster and Smarter Adversaries as Identity-Focused Attacks Skyrocket |
- |
Dec 02, 2019 |
2064 |
- |
| CrowdStrike Achieves 100% Detection Coverage in MITRE ATT&CK Evaluations in All 20 Steps of the Evaluation |
- |
Dec 02, 2019 |
2975 |
- |
| Categories Overview |
- |
Dec 02, 2019 |
1413 |
- |
| SuperMem: A Free CrowdStrike Incident Response Tool for Automating Memory Image Processing |
- |
Dec 02, 2019 |
2324 |
- |
| Response When Minutes Matter: When Good Tools Are Used for (R)Evil |
CrowdStrike Intelligence |
Dec 02, 2019 |
2641 |
- |
| Malware-Free Intrusions: Adversary Tricks and CrowdStrike Treats |
FBI Implicates North Korea |
Dec 02, 2019 |
2053 |
- |
| Situational Awareness: Cyber Threats Heightened by COVID-19 and How to Protect Against Them |
COVID |
Dec 02, 2019 |
6937 |
- |
| Virgin Hyperloop Protects IP, Augments Team with Falcon Complete and Falcon OverWatch Managed Services |
- |
Dec 02, 2019 |
1340 |
- |
| SMB Security Survey Reveals High Awareness, Lagging Protection |
- |
Dec 02, 2019 |
2052 |
- |
| LIMINAL PANDA: A Roaming Threat to Telecommunications Companies |
SIGTRANslator |
Dec 02, 2019 |
3666 |
- |
| Cyber Kung-Fu: The Great Firewall Art of DNS Poisoning |
- |
Dec 02, 2019 |
2056 |
- |
| Active Directory Open to More NTLM Attacks: Drop The MIC 2 (CVE 2019-1166) and Exploiting LMv2 Clients (CVE-2019-1338) |
Preempt |
Dec 02, 2019 |
2783 |
- |
| Callback Malware Campaigns Impersonate CrowdStrike and Other Cybersecurity Companies |
Cobalt Strike |
Dec 02, 2019 |
1412 |
- |
| CrowdStrike CEO and Co-founder George Kurtz Wins Ernst & Young Entrepreneur of the Year for Security |
- |
Dec 02, 2019 |
1488 |
- |
| Testing the Untestable in Java |
Glen McCluskey Learn |
Dec 02, 2019 |
2287 |
- |
| December 2021 Patch Tuesday: AppX Installer Zero-day, Multiple Critical Vulnerabilities |
Microsoft |
Dec 02, 2019 |
2352 |
- |
| Why You Need an Adversary-focused Approach to Stop Cloud Breaches |
- |
Dec 02, 2019 |
2020 |
- |
| This Year’s CrowdStrike Services Report Offers Observations on 2020 Cyber Threat Trends and Insights for 2021 |
- |
Dec 02, 2019 |
1727 |
- |
| CrowdStrike Falcon® Platform Positioned for CMMC |
- |
Dec 02, 2019 |
1995 |
- |
| Data Protection |
- |
Dec 02, 2019 |
1805 |
- |
| CrowdStrike Advances to Research Partner with MITRE Engenuity Center for Threat-Informed Defense to Help Lead the Future of Cyber Defense |
CrowdStrike |
Dec 02, 2019 |
1655 |
- |
| The Right Endpoint Detection and Response (EDR) Can Mitigate Silent Failure |
- |
Dec 02, 2019 |
1818 |
- |
| CrowdStrike Named a Leader that “Delivers World-Class Threat Intelligence” in 2023 Forrester Wave |
Quadrant Knowledge Solutions |
Dec 02, 2019 |
2156 |
- |
| Customers, Conviction, Speed: A Conversation With George Kurtz, CEO and Co-Founder at CrowdStrike |
Humio |
Dec 02, 2019 |
4036 |
- |
| December 2023 Patch Tuesday: 34 Vulnerabilities Including One Previously Disclosed Zero-Day |
Windows |
Dec 02, 2019 |
1895 |
- |
| When CrowdStrike Is #1, Our Customers Win |
- |
Dec 02, 2019 |
2473 |
- |
| Expose and Disrupt Adversaries Beyond the Perimeter with CrowdStrike Falcon Intelligence Recon |
CrowdStrike Intelligence |
Dec 02, 2019 |
2070 |
- |
| CrowdStrike Unifies Threat Data and AI for Next-Gen Managed Detection and Response |
- |
Dec 02, 2019 |
1665 |
- |
| Attackers Set Sights on Active Directory: Understanding Your Identity Exposure |
Active Directory |
Dec 02, 2019 |
2127 |
- |
| New Mercedes-AMG F1 W13 E Rises to the Challenge for Formula One 2022 |
- |
Dec 02, 2019 |
1557 |
- |
| CrowdStrike Brings Extended Detection and Response to New z16 and LinuxONE 4 Single Frame and Rack Mount Models |
IBM |
Dec 02, 2019 |
1740 |
- |
| CrowdStrike Expands Support and Protection for AWS Services |
AWS |
Dec 02, 2019 |
1899 |
- |
| Consolidated Identity Protection in a Unified Security Platform Is a Must-Have for the Modern SOC |
Gartner |
Dec 02, 2019 |
2367 |
- |
| CrowdStrike Falcon Platform Achieves 100% Ransomware Prevention with Zero False Positives, Wins AAA Enterprise Advanced Security Award from SE Labs |
SE Labs |
Dec 02, 2019 |
2392 |
- |
| Detecting and Mitigating NTLM Relay Attacks Targeting Microsoft Domain Controllers |
- |
Dec 02, 2019 |
2185 |
- |
| Know Your Attackers: 2020 CrowdStrike Services Report Key Findings (Part 1 of 2) |
CSO |
Dec 02, 2019 |
2360 |
- |
| DevSecOps: 5 Tips for Developing Better, Safer Apps |
- |
Dec 02, 2019 |
2238 |
- |
| August 2021 Patch Tuesday: Active Exploited Vulnerabilities, Window Print Spooler Updates and More |
Microsoft |
Dec 02, 2019 |
2610 |
- |
| Join CrowdStrike at AWS re:Invent 2020 |
- |
Dec 02, 2019 |
1890 |
- |
| Why the CrowdStrike Partnership With Mercedes-AMG Petronas Motorsport is Passionately Driven |
- |
Dec 02, 2019 |
1619 |
- |
| CrowdStrike’s Matt LeMiere on Why Schools Are Failing Cybersecurity |
- |
Dec 02, 2019 |
1829 |
- |
| Formula 1 Racing and Stopping Breaches |
CrowdStrike |
Dec 02, 2019 |
1881 |
- |
| CrowdStrike and Verizon Form Partnership to Provide Integrated Solutions and Services to Customers |
Verizon |
Dec 02, 2019 |
1838 |
- |
| Threat Actor Distributes Python-Based Information Stealer Using a Fake Falcon Sensor Update Lure |
- |
Dec 02, 2019 |
1842 |
- |
| CrowdStrike Falcon Pro for Mac Achieves 100% Mac Malware Protection, Awarded 2023 AV-Comparatives Approved Mac Security Product |
- |
Dec 02, 2019 |
1969 |
- |
| How to Protect Cloud Workloads from Zero-day Vulnerabilities |
- |
Dec 02, 2019 |
2385 |
- |
| Big Game Hunting with Ryuk: Another Lucrative Targeted Ransomware |
WIZARD SPIDER |
Dec 02, 2019 |
5661 |
- |
| 2021 Threat Hunting Report: OverWatch Once Again Leaves Adversaries with Nowhere to Hide |
OverWatchSix |
Dec 02, 2019 |
1715 |
- |
| February 2022 Patch Tuesday: Windows Kernel Zero-Day and Servicing Stack Updates |
Microsoft |
Dec 02, 2019 |
2563 |
- |
| How to Test Endpoint Security Efficacy and What to Expect |
RaaS |
Dec 02, 2019 |
5448 |
- |
| The Current State of Exploit Development, Part 1 |
CFG |
Dec 02, 2019 |
4758 |
- |
| Try freefor 15 days |
CrowdStrike |
Sep 24, 2025 |
1341 |
- |
| CrowdStrike Joins with Netskope, Okta and Proofpoint to Secure Remote Work Anytime and Anywhere at Scale |
- |
Dec 02, 2019 |
2344 |
- |
| Occupy Central: The Umbrella Revolution and Chinese Intelligence |
Occupy Central |
Dec 02, 2019 |
2362 |
- |
| WebAssembly Is Abused by eCriminals to Hide Malware |
WebAssembly |
Dec 02, 2019 |
2387 |
- |
| Endpoint Protection and Threat Intelligence: The Way Forward [VIDEO] |
Gartner |
Dec 02, 2019 |
1620 |
- |
| CrowdStrike CEO: Pandemic Fuels Digital and Security Transformation Trends |
- |
Dec 02, 2019 |
1406 |
- |
| Falcon Fusion SOAR and Machine Learning-based Detections Automate Data Protection Workflows |
Falcon Data Protection |
Dec 02, 2019 |
2533 |
- |
| CrowdStrike Launches Agentic Security Workforce to Transform the SOC |
Charlotte AI |
Dec 02, 2019 |
2649 |
- |
| Full Decryption of Systems Encrypted by Petya/NotPetya |
Petya |
Dec 02, 2019 |
2444 |
- |
| Who is Clever Kitten |
AdamM |
Dec 02, 2019 |
2149 |
- |
| Two Effective Strategies to Reduce Critical Vulnerabilities in Applications |
ASPM |
Dec 02, 2019 |
1863 |
- |
| EMBER2024: Advancing the Training of Cybersecurity ML Models Against Evasive Malware |
- |
Dec 02, 2019 |
2628 |
- |
| CrowdStrike at Oktane22: Celebrating Our Best-in-Class Partnership and Empowering Customers to Secure Identities |
Okta |
Dec 02, 2019 |
2102 |
- |
| Finding Waldo: Leveraging the Apple Unified Log for Incident Response |
- |
Dec 02, 2019 |
3336 |
- |
| What Makes CrowdStrike Falcon LogScale So Fast |
- |
Dec 02, 2019 |
2157 |
- |
| From The Front Lines |
Red Hat |
Dec 02, 2019 |
10826 |
- |
| Gimme Shellter |
Microsoft |
Dec 02, 2019 |
2525 |
- |
| Hat-tribution to PLA Unit 61486 |
PUTTER PANDA |
Dec 02, 2019 |
2478 |
- |
| Looking for an Alternative to Splunk, Elasticsearch, Sumo Logic or Datadog? Consider Running Multiple Log Management Systems Instead |
- |
Dec 02, 2019 |
1950 |
- |
| New Evidence Proves Ongoing WIZARD SPIDER / LUNAR SPIDER Collaboration |
LUNAR SPIDER |
Dec 02, 2019 |
1547 |
- |
| Secure Your Staff: How to Protect High-Profile Employees' Sensitive Data on the Web |
CrowdStrike Counter Adversary Operations |
Dec 02, 2019 |
2367 |
- |
| Large-Scale Endpoint Security MOLD Remediation |
Bootkrajang |
Dec 02, 2019 |
3361 |
- |
| September 2025 Patch Tuesday: Two Publicly Disclosed Zero-Days and Eight Critical Vulnerabilities Among 84 CVEs |
Extended Security Updates |
Dec 02, 2019 |
2922 |
- |
| SUNSPOT: An Implant in the Build Process |
ERROR |
Dec 02, 2019 |
4163 |
- |
| Channel File 291 Incident: Root Cause Analysis is Available |
CrowdStrike |
Dec 02, 2019 |
1328 |
- |
| Hunting Badness on OS X with CrowdStrike's Falcon Real-Time Forensic Capabilities |
Python |
Dec 02, 2019 |
3468 |
- |
| Falcon Zero-Day Flash Detection |
Falcon Overwatch |
Dec 02, 2019 |
1786 |
- |
| Hunting for the Confluence Exploitation: When Falcon OverWatch Becomes the First Line of Defense |
OverWatch |
Dec 02, 2019 |
2027 |
- |
| Maze Ransomware Analysis and Protection |
Maze |
Dec 02, 2019 |
2604 |
- |
| CrowdStrike and Cloud Security Alliance Collaborate to Enable Pervasive Zero Trust |
- |
Dec 02, 2019 |
2295 |
- |
| 4 Major Falcon LogScale Next-Gen SIEM Updates That Accelerate Time-to-Insights |
- |
Dec 02, 2019 |
2130 |
- |
| Tech Analysis: Channel File May Contain Null Bytes |
Common Criteria |
Dec 02, 2019 |
1845 |
- |
| Response When Minutes Matter: Falcon Complete Disrupts WIZARD SPIDER eCrime Operators |
- |
Dec 02, 2019 |
3096 |
- |
| OWASSRF: CrowdStrike Identifies New Exploit Method for Exchange Bypassing ProxyNotShell Mitigations |
Microsoft |
Dec 02, 2019 |
2466 |
- |
| CrowdStrike and AWS Expand Integrations to Provide Customers Multi-layered Protection Against Ransomware Attacks and Sophisticated Threats |
- |
Dec 02, 2019 |
2197 |
- |
| How CrowdStrike Uses SHAP to Enhance Machine Learning Models |
- |
Dec 02, 2019 |
1790 |
- |
| New Container Exploit: Rooting Non-Root Containers with CVE-2023-2640 and CVE-2023-32629, aka GameOver(lay) |
- |
Dec 02, 2019 |
2651 |
- |
| Does Your MDR Deliver Outcomes — or Homework? |
- |
Dec 02, 2019 |
2468 |
- |
| CrowdStrike Is Working to Strengthen the U.S. Government’s Cybersecurity Posture |
CrowdStrike |
Dec 02, 2019 |
2082 |
- |
| Is There Such a Thing as a Malicious PowerShell Command? |
- |
Dec 02, 2019 |
2045 |
- |
| Organizations See Dramatic Reductions in Alert Fatigue With CrowdScore |
Moving |
Dec 02, 2019 |
2016 |
- |
| CrowdStrike Research Investigates Exploit Behavior to Strengthen Customer Protection |
- |
Dec 02, 2019 |
3265 |
- |
| Supercharge Your Security Transformation: Kill Complexity in Your Security Stack |
- |
Dec 02, 2019 |
2387 |
- |
| CrowdStrike to Acquire Bionic to Extend Cloud Security Leadership with Industry’s Most Complete Code-to-Runtime Cybersecurity Platform |
- |
Dec 02, 2019 |
2171 |
- |
| Keep Your Tools Patched: Preventing Remote Code Execution with Falcon Complete |
- |
Dec 02, 2019 |
2405 |
- |
| From the Board Room to the Dining Room: Making Cybersecurity Everyone’s Duty |
- |
Dec 02, 2019 |
2243 |
- |
| A Roadmap to Cybersecurity Maturity, Part 2: Am I Mature? |
- |
Dec 02, 2019 |
2084 |
- |
| CrowdStrike Falcon® Platform Summer Release: Delivering HOT New Features |
OLD |
Dec 02, 2019 |
2133 |
- |
| Accelerate Your Security Transformation with Google Workspace and CrowdStrike |
- |
Dec 02, 2019 |
1679 |
- |
| Arrests Put New Focus on CARBON SPIDER Adversary Group |
CARBON SPIDER |
Dec 02, 2019 |
3852 |
- |
| CrowdStrike Is the First to Bring Endpoint Detection and Response (EDR) to Mobile Devices |
Falcon |
Dec 02, 2019 |
2412 |
- |
| Testing Data Flows Using Python and Remote Functions |
- |
Dec 02, 2019 |
2293 |
- |
| CrowdStrike Native XDR Now Brings Faster, More Comprehensive Detections to EDR Customers at No Additional Cost |
Falcon Identity Protection |
Dec 02, 2019 |
2364 |
- |
| CrowdStrike Enhances Cloud Detection and Response (CDR) Capabilities to Protect CI/CD Pipeline |
- |
Dec 02, 2019 |
2276 |
- |
| CrowdStrike evaluated in Gartner’s Comparison of Endpoint Detection and Response Technologies and Solutions |
Gartner |
Dec 02, 2019 |
1352 |
- |
| Blocking SolarMarker Backdoor |
- |
Dec 02, 2019 |
3457 |
- |
| January 2022 Patch Tuesday: Multiple Critical Vulnerabilities and Microsoft Exchange Remote Code Execution |
Microsoft |
Dec 02, 2019 |
2573 |
- |
| 5 Best Practices to Secure AWS Resources |
CrowdStrike Falcon Adversary Intelligence |
Dec 02, 2019 |
3514 |
- |
| CrowdStrike Falcon® Pro for Mac Achieves 100% Mac Malware Protection, Wins Fifth AV-Comparatives Approved Mac Security Product Award |
Building Your Security Stack |
Dec 02, 2019 |
1799 |
- |
| “Gitting” the Malware: How Threat Actors Use GitHub Repositories to Deploy Malware |
CrowdStrike |
Dec 02, 2019 |
3306 |
- |
| Zerologon (CVE-2020-1472): An Unauthenticated Privilege Escalation to Full Domain Privileges |
Secura |
Dec 02, 2019 |
2185 |
- |
| How CrowdStrike Falcon Stops REvil Ransomware Used in the Kaseya Attack |
REvil |
Dec 02, 2019 |
2197 |
- |
| Reconnaissance Detection (Blue Team) |
ChadT |
Dec 02, 2019 |
1957 |
- |
| CrowdStrike Collaborates with NVIDIA to Redefine Cybersecurity for the Generative AI Era |
- |
Dec 02, 2019 |
1822 |
- |
| Forrester Names CrowdStrike a Leader in the 2018 Wave for Endpoint Detection And Response |
- |
Dec 02, 2019 |
1869 |
- |
| 2018 Outlook: Public Sector Enterprises Should Prepare for Increasingly Sophisticated Cyberattacks [VIDEO] |
- |
Dec 02, 2019 |
1373 |
- |
| ECX: Big Game Hunting on the Rise Following a Notable Reduction in Activity |
Babuk Locker |
Dec 02, 2019 |
2031 |
- |
| CrowdStrike Launch |
Warburg Pincus
As |
Dec 02, 2019 |
2168 |
- |
| You Can’t Protect What You Can’t See: Five Cloud Security Must-haves |
- |
Dec 02, 2019 |
2018 |
- |
| July 2024 Patch Tuesday: Two Zero-Days and Five Critical Vulnerabilities Amid 142 CVEs |
Extended Security Update |
Dec 02, 2019 |
2214 |
- |
| Introducing CrowdStream: Simplifying XDR Adoption and Solving Security’s Data Challenge |
Cribl
Security |
Dec 02, 2019 |
1807 |
- |
| CrowdStrike Invests in and Partners with Prelude Security to Drive Continuous Security Testing and Validation for Our Customers |
- |
Dec 02, 2019 |
1629 |
- |
| CrowdStrike Launches Free Tool to Identify and Help Mitigate Risks in Azure Active Directory |
Microsoft |
Dec 02, 2019 |
2979 |
- |
| How Falcon OverWatch Hunts for Out-of-Band Application Security Testing |
- |
Dec 02, 2019 |
2268 |
- |
| Get Used to Hearing About Cybersecurity Concerns |
- |
Dec 02, 2019 |
1634 |
- |
| April 2023 Patch Tuesday: One Zero-Day and Seven Critical Vulnerabilities Identified |
Extended Support Updates |
Dec 02, 2019 |
2343 |
- |
| How Adversaries Can Persist with AWS User Federation |
AWS |
Dec 02, 2019 |
4011 |
- |
| CrowdStrike Teams with the MITRE Engenuity Center for Threat-Informed Defense in Development of TRAM II |
CrowdStrike |
Dec 02, 2019 |
2102 |
- |
| Is Measurable Security Possible? |
CrowdScore |
Dec 02, 2019 |
2868 |
- |
| CrowdStrike Receives Highest Overall Score in Gartner Peer Insights for EDR for the Second Year in a Row |
Gartner Peer Insights |
Dec 02, 2019 |
2239 |
- |
| Log4j2 Vulnerability "Log4Shell" (CVE-2021-44228) |
- |
Dec 02, 2019 |
2441 |
- |
| Making Threat Graph Extensible: Leveraging a DSL to Improve Data Ingestion (Part 1 of 2) |
Threat Graph |
Dec 02, 2019 |
3234 |
- |
| The Power of Winning Together: Partners Help CrowdStrike Win Recognition Awards and Races |
- |
Dec 02, 2019 |
1900 |
- |
| CrowdStrike Achieves FedRAMP® High Authorization |
CrowdStrike |
Dec 02, 2019 |
2169 |
- |
| Deep in Thought: Chinese Targeting of National Security Think Tanks |
Falcon Host |
Dec 02, 2019 |
2594 |
- |
| CrowdStrike Named a Leader in Frost & Sullivan's 2022 Frost Radar for CNAPP |
Frost |
Dec 02, 2019 |
1807 |
- |
| Falcon OverWatch Hunts Down Adversaries Where They Hide |
OverWatch |
Dec 02, 2019 |
3451 |
- |
| At RSA, SC Magazine Names CrowdStrike Falcon® Intelligence Best Threat Intelligence Technology |
SC Magazine |
Dec 02, 2019 |
2168 |
- |
| Our Customers Have Spoken: CrowdStrike Delivers the Best in EDR, EPP and XDR |
- |
Dec 02, 2019 |
1984 |
- |
| Golang Malware Is More than a Fad: Financial Motivation Drives Adoption |
- |
Dec 02, 2019 |
3269 |
- |
| Why Cybersecurity Should be a Board-Level Discussion |
- |
Dec 02, 2019 |
1471 |
- |
| How to Avoid Being Impacted by a Managed Service Provider (MSP) Breach |
CrowdStrike Intelligence |
Dec 02, 2019 |
2128 |
- |
| CrowdStrike vs. Microsoft Defender for Endpoint: A Cybersecurity Leader Compares EDR Tools |
- |
Dec 02, 2019 |
1870 |
- |
| One Year Later: Reflecting on Building Resilience by Design |
Alex Ionescu |
Dec 02, 2019 |
2902 |
- |
| Decryptable PartyTicket Ransomware Reportedly Targeting Ukrainian Entities |
PartyTicket |
Dec 02, 2019 |
2594 |
- |
| Innovate and Secure with CrowdStrike at AWS re:Invent 2022 |
Turning DevOps |
Dec 02, 2019 |
2283 |
- |
| May 2024 Patch Tuesday: Two Zero-Days Among 61 Vulnerabilities Addressed |
Extended Security Update |
Dec 02, 2019 |
1870 |
- |
| CrowdStrike 2023 Global Threat Report: Resilient Businesses Fight Relentless Adversaries |
- |
Dec 02, 2019 |
1978 |
- |
| OverWatch Elite In Action: Prompt Call Escalation Proves Vital to Containing Attack |
OverWatch Elite |
Dec 02, 2019 |
2062 |
- |
| Furthest Right in Vision. Highest in Ability to Execute. Only CrowdStrike. |
CrowdStrike |
Dec 02, 2019 |
2076 |
- |
| Multi-Layered Prevention for the Endpoint |
CrowdStrike |
Dec 02, 2019 |
1745 |
- |
| CrowdStrike Customers Share Benefits of Cybersecurity Consolidation and Technology Integrations |
- |
Dec 02, 2019 |
2153 |
- |
| Falcon Extends Protection for macOS as Threats Surge |
- |
Dec 02, 2019 |
2110 |
- |
| Falcon Insight XDR and Falcon LogScale: What You Need to Know |
- |
Dec 02, 2019 |
2413 |
- |
| Introducing CrowdStrike Falcon® Spotlight: Vulnerability Management Comes of Age |
- |
Dec 02, 2019 |
2453 |
- |
| Set Up Your Logs for Better Insight: Make Logs First-class Citizens In Your Codebase |
- |
Dec 02, 2019 |
2651 |
- |
| Introducing Charlotte AI, CrowdStrike’s Generative AI Security Analyst: Ushering in the Future of AI-Powered Cybersecurity |
- |
Dec 02, 2019 |
2973 |
- |
| The F1 “Pit Wall”: A Better Metaphor for Teamwork |
Steve Etherington |
Dec 02, 2019 |
2181 |
- |
| CrowdStrike Scores Highest Overall for Use Case Type A or “Forward Leaning” Organizations in Gartner’s Critical Capabilities for Endpoint Protection Platforms |
Gartner |
Dec 02, 2019 |
1532 |
- |
| The Adversary Manifesto: A Q&A with CrowdStrike’s VP of Threat Intelligence |
- |
Dec 02, 2019 |
1861 |
- |
| EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis |
- |
Dec 02, 2019 |
3399 |
- |
| Make Cloud Defense a Team Sport by Turning DevOps into a Force Multiplier |
Turning DevOps |
Dec 02, 2019 |
1922 |
- |
| Why Legacy AV Is an Easy Target for Attackers |
- |
Dec 02, 2019 |
2331 |
- |
| CrowdResponse Release and new @Tasks modules |
Reed |
Dec 02, 2019 |
2022 |
- |
| Falcon Spotlight ExPRT.AI Aids Federal Agencies in Meeting CISA Mandate |
- |
Dec 02, 2019 |
1950 |
- |
| CrowdStrike Achieves 100% Ransomware Protection Accuracy and 100% EDR Rating in SE Labs Test |
SE Labs |
Dec 02, 2019 |
2081 |
- |
| August 2024 Patch Tuesday: Six Zero-Days and Six Critical Vulnerabilities Amid 85 CVEs |
Extended Security Update |
Dec 02, 2019 |
3090 |
- |
| Approaching Zero Dwell Time: A Strategy for Finding and Stopping Attackers Before They Do Damage |
- |
Dec 02, 2019 |
1993 |
- |
| The Anatomy of Wiper Malware, Part 2: Third-Party Drivers |
Microsoft |
Dec 02, 2019 |
2911 |
- |
| Why Cybercrime Remains a Worrying Business Challenge in a COVID-lockdown World |
- |
Dec 02, 2019 |
2275 |
- |
| Leveraging Falcon Sandbox to Detect and Analyze Malicious PDFs Containing Zero-Day Exploits |
Falcon Sandbox |
Dec 02, 2019 |
1942 |
- |
| CrowdStrike and Dell: Making Cybersecurity Fast and Frictionless |
- |
Dec 02, 2019 |
2002 |
- |
| CrowdStrike Tech Hub |
- |
Apr 25, 2024 |
1559 |
- |
| A Deep Dive into Custom Spark Transformers for Machine Learning Pipelines |
- |
Dec 02, 2019 |
3590 |
- |
| Blurring of Commodity and Targeted Attack Malware |
Dynamic Network Services |
Dec 02, 2019 |
3050 |
- |
| New Falcon Fund Helps Startups Develop Innovative Apps for the Falcon Platform |
- |
Dec 02, 2019 |
1901 |
- |
| Adversaries Can “Log In with Microsoft” through the nOAuth Azure Active Directory Vulnerability |
Descope |
Dec 02, 2019 |
3162 |
- |
| The Power of The Platform: Spring Release Extends The CrowdStrike Falcon® Platform |
- |
Dec 02, 2019 |
1815 |
- |
| CrowdStrike Named the Only Customers' Choice: 2024 Gartner® “Voice of the Customer” for Vulnerability Assessment |
- |
Dec 02, 2019 |
2086 |
- |
| CrowdStrike Falcon® Proactively Protects Against Wiper Malware as CISA Warns U.S. Companies of Potential Attacks |
- |
Dec 02, 2019 |
1895 |
- |
| Inside the MITRE ATT&CK Evaluation: How CrowdStrike’s Elite Managed Services Operate in the Real World |
MITRE |
Dec 02, 2019 |
2808 |
- |
| CrowdStrike 2019 Fall Platform Release: New Falcon Firewall Management Module and More |
- |
Dec 02, 2019 |
2230 |
- |
| Response When Minutes Matter: A Simple Clue Uncovers a Global Attack Campaign |
- |
Dec 02, 2019 |
2444 |
- |
| CrowdStrike to Acquire Pangea to Secure Enterprise AI Use and Development |
- |
Dec 02, 2019 |
2068 |
- |
| Meet CrowdStrike’s Adversary of the Month for October: DUNGEON SPIDER |
AdamM |
Dec 02, 2019 |
1647 |
- |
| Falcon OverWatch Granted Patents for Two Innovative Workflow Tools |
- |
Dec 02, 2019 |
1890 |
- |
| Oh No! My Data Science Is Getting Rust-y |
- |
Dec 02, 2019 |
3165 |
- |
| How CrowdStrike Traces Attack Paths to Sensitive Data in the Cloud |
ExPRT |
Dec 02, 2019 |
1985 |
- |
| Hiding in Plain Sight: Using the Office 365 Activities API to Investigate Business Email Compromises |
Microsoft |
Dec 02, 2019 |
5374 |
- |
| The Myth of Part-time Threat Hunting, Part 2: Leveraging the Power of Human Ingenuity |
- |
Dec 02, 2019 |
2431 |
- |
| The Easy Solution for Stopping Modern Attacks |
- |
Dec 02, 2019 |
1804 |
- |
| Credential Theft: An Adversary Favorite |
CrowdStrike |
Dec 02, 2019 |
1974 |
- |
| CrowdStrike Falcon® Forensics: Ditch Inefficient Incident Response Tools for Good |
- |
Dec 02, 2019 |
1818 |
- |
| Falcon Fund in Focus: Aembit Strengthens Security for Workload-to-Workload Access |
- |
Dec 02, 2019 |
1746 |
- |
| New to GovCloud: Falcon Managed Detection and Response Transforms Government Security |
Forrester Research |
Dec 02, 2019 |
2102 |
- |
| Introducing CrowdStrike Falcon Complete XDR: Solving the Cybersecurity Skills Gap with Managed XDR |
Craig Robinson |
Dec 02, 2019 |
2252 |
- |
| Stop Phishing Attacks with Next-Gen SIEM and SOAR |
CrowdStrike |
Dec 02, 2019 |
2050 |
- |
| May 2023 Patch Tuesday: Three Zero-Days and Six Critical Vulnerabilities Identified |
Extended Support Updates |
Dec 02, 2019 |
2330 |
- |
| Don't Even Think of Complying with the New NIST Cybersecurity Framework! |
SteveC |
Dec 02, 2019 |
1951 |
- |
| Securing PostgreSQL from Cryptojacking Campaigns in Kubernetes |
- |
Dec 02, 2019 |
3465 |
- |
| Innovations in Falcon Cloud Security at Fal.Con 2024 |
Flow Security |
Dec 02, 2019 |
2180 |
- |
| Chaos in the Cloud: Rampant Cloud Activity Requires Modern Protection |
- |
Dec 02, 2019 |
1934 |
- |
| Unexpected Adventures in JSON Marshaling |
Accident
The |
Dec 02, 2019 |
2802 |
- |
| CrowdStrike Named "Visionary" in Gartner Magic Quadrant |
- |
Dec 02, 2019 |
1529 |
- |
| Industry Outlook: A Long-Range View of the Cybersecurity Landscape |
- |
Dec 02, 2019 |
2416 |
- |
| DNS - The Lifeblood of your Domain |
AdamM |
Dec 02, 2019 |
2064 |
- |
| Prevention Is the Best Preparation for the SEC’s New Breach Disclosure Rules |
- |
Dec 02, 2019 |
2983 |
- |
| Tech Analysis: Addressing Claims About Falcon Sensor Vulnerability |
- |
Dec 02, 2019 |
2526 |
- |
| Forrester Names CrowdStrike “Leader” in the 2019 Wave for Cybersecurity Incident Response Services |
- |
Dec 02, 2019 |
1834 |
- |
| CrowdStrike’s Cloud Security and Observability Capabilities to Be Showcased at KubeCon + CloudNativeCon North America 2022 |
- |
Dec 02, 2019 |
1784 |
- |
| Understanding Indicators of Attack (IOAs): The Power of Event Stream Processing in CrowdStrike Falcon® |
- |
Dec 02, 2019 |
2321 |
- |
| The Rise and Fall of WebNavigatorBrowser: Chromium-based Adware Browser |
Better Cloud Solutions LTD |
Dec 02, 2019 |
1850 |
- |
| CrowdStrike CTO Michael Sentonas Shares Insights on Humio |
- |
Dec 02, 2019 |
1710 |
- |
| Chopping packets: Decoding China Chopper Web shell traffic over SSL |
Chinese |
Dec 02, 2019 |
1851 |
- |
| Gameover |
AdamM |
Dec 02, 2019 |
2469 |
- |
| Weaponized Disk Image Files: Analysis, Trends and Remediation |
- |
Dec 02, 2019 |
2757 |
- |
| CrowdStrike’s Free TensorFlow-to-Rust Conversion Tool Enables Data Scientists to Run Machine Learning Models as Pure Safe Code |
Rust |
Dec 02, 2019 |
3066 |
- |
| Blocking Malicious PowerShell Downloads |
- |
Dec 02, 2019 |
2386 |
- |
| CrowdStrike Services Launches Log4j Quick Reference Guide (QRG) |
- |
Dec 02, 2019 |
1712 |
- |
| A Foray into Fuzzing |
- |
Dec 02, 2019 |
4012 |
- |
| Lessons Learned From Successive Use of Offensive Cyber Operations Against Ukraine and What May Be Next |
VOODOO BEAR |
Dec 02, 2019 |
3224 |
- |
| Danger Close: Fancy Bear Tracking of Ukrainian Field Artillery Units |
AdamM |
Dec 02, 2019 |
1957 |
- |
| Make Compliance a Breeze with Modern Log Management |
- |
Dec 02, 2019 |
2047 |
- |
| Unpacking Dynamically Allocated Code |
VirtualAlloc |
Dec 02, 2019 |
2096 |
- |
| Why Machine Learning Is a Critical Defense Against Malware |
- |
Dec 02, 2019 |
1915 |
- |
| *NEW* Community Tool: CrowdResponse |
- |
Dec 02, 2019 |
2189 |
- |
| HTTP iframe Injecting Linux Rootkit |
- |
Dec 02, 2019 |
4051 |
- |
| CrowdStrike’s Adversary Universe World Tour: Coming to a City Near You! |
- |
Dec 02, 2019 |
2107 |
- |
| August 2022 Patch Tuesday: 17 Critical CVEs and Two Zero-Days, One Under Active Exploitation |
August |
Dec 02, 2019 |
2434 |
- |
| CrowdStrike Receives Highest Ranking in Recent Third-Party Tests |
SC Labs |
Dec 02, 2019 |
2716 |
- |
| The Hole in the Donut: Franchise Relationships Create Unique Cybersecurity Risks |
- |
Dec 02, 2019 |
2062 |
- |
| Getting Started Guide: Falcon Long Term Repository |
- |
Dec 02, 2019 |
1829 |
- |
| What is Cloud Native, Anyway? |
- |
Dec 02, 2019 |
2385 |
- |
| January 2023 Patch Tuesday: 98 Vulnerabilities with 11 Rated Critical and 1 Zero-Day Under Active Attack |
Extended Support Updates |
Dec 02, 2019 |
2282 |
- |
| June 2023 Patch Tuesday: 78 Vulnerabilities with 6 Rated Critical and 38 Remote Code Execution |
Developer Tools |
Dec 02, 2019 |
2090 |
- |
| Herpaderping: Security Risk or Unintended Behavior? |
Mark Russinovich |
Dec 02, 2019 |
2611 |
- |
| CrowdStrike’s Artificial Intelligence Tooling Uses Similarity Search to Analyze Script-Based Malware Attack Techniques |
- |
Dec 02, 2019 |
3348 |
- |
| Falcon Cloud Security Supports Google Cloud Run to Strengthen Serverless Application Security |
- |
Dec 02, 2019 |
2020 |
- |
| Spark Hot Potato: Passing DataFrames Between Scala Spark and PySpark |
- |
Dec 02, 2019 |
2492 |
- |
| CrowdStrike Collaborates with AI Leaders to Secure AI Across the Enterprise |
- |
Dec 02, 2019 |
2147 |
- |
| CrowdStrike Machine Learning and VirusTotal |
- |
Dec 02, 2019 |
2344 |
- |
| Getting the Bacon from the Beacon |
Cobalt Strike |
Dec 02, 2019 |
3244 |
- |
| Double Trouble: Ransomware with Data Leak Extortion, Part 1 |
BOSS SPIDER |
Dec 02, 2019 |
4239 |
- |
| Recent Blogs |
- |
Dec 02, 2019 |
1447 |
- |
| Earn Your Wings in the New CrowdStrike Community |
- |
Dec 02, 2019 |
1730 |
- |
| Building a String-Based Machine Learning Model to Detect Malicious Activity |
- |
Dec 02, 2019 |
2437 |
- |
| Go Beyond the Perimeter: Frictionless Zero Trust With CrowdStrike and Zscaler |
- |
Dec 02, 2019 |
1922 |
- |
| CISO Explains Switch from Microsoft to CrowdStrike for Cybersecurity |
- |
Dec 02, 2019 |
1988 |
- |
| OverWatch Insights: Reviewing a New Intrusion Targeting Mac Systems |
CrowdStrike |
Dec 02, 2019 |
2298 |
- |
| Detect Adversary Behavior in Real Time With CrowdStrike Falcon® Horizon and Amazon EventBridge |
Bett |
Dec 02, 2019 |
2362 |
- |
| Amid Sharp Increase in Identity-Based Attacks, CrowdStrike Unveils New Threat Hunting Capability |
Bdenneu |
Dec 02, 2019 |
2168 |
- |
| Q&A: How Mastronardi Produce Secures Innovation with CrowdStrike |
- |
Dec 02, 2019 |
1892 |
- |
| CrowdStrike Pursues Higher Standards in Cloud Compliance To Better Protect Our Federal Customers |
- |
Dec 02, 2019 |
1791 |
- |
| First-Ever Adversary Ranking in 2019 Global Threat Report Highlights the Importance of Speed |
AdamM |
Dec 02, 2019 |
2519 |
- |
| CROWDSTRIKE FALCON XDR: Extending Detection and Response — The Right Way |
- |
Dec 02, 2019 |
3689 |
- |
| CrowdStrike Advances Next-Gen Identity Security with Three Key Innovations |
- |
Dec 02, 2019 |
2181 |
- |
| Observability (Re)defined |
- |
Dec 02, 2019 |
3109 |
- |
| Enhanced Industrial Threat Detection: Get Early Warnings of Adversaries in Your Enterprise Networks |
Dragos |
Dec 02, 2019 |
2113 |
- |
| Welcome to the Adversary Universe Podcast: Unmasking the Threat Actors Targeting Your Organization |
CrowdStrike SVP |
Dec 02, 2019 |
1660 |
- |
| XDR: A New Vision for InfoSec’s Ongoing Problems |
Alice |
Dec 02, 2019 |
3345 |
- |
| NHS Matures Healthcare Cybersecurity with NCSC’s CAF Assurance Model |
- |
Dec 02, 2019 |
2225 |
- |
| CrowdStrike Falcon Platform Delivers $6 Return for Every $1 Invested |
CrowdStrike |
Dec 02, 2019 |
1955 |
- |
| Diving Deep: Analyzing 2021 Patch Tuesday and Out-of-Band Vulnerability Disclosures |
Microsoft |
Dec 02, 2019 |
3866 |
- |
| CrowdStrike a Research Participant in Two Latest Center for Threat-Informed Defense Projects |
CrowdStrike |
Dec 02, 2019 |
2434 |
- |
| Analysis of a CVE-2013-3906 Exploit |
CrowdStrike |
Dec 02, 2019 |
3425 |
- |
| Expert Insights From the Fal.Con 2020 Election Protection Panel |
- |
Dec 02, 2019 |
9261 |
- |
| Global Survey Reveals Supply Chain as a Rising and Critical New Threat Vector |
- |
Dec 02, 2019 |
2266 |
- |
| Quadrant Knowledge Solutions Names CrowdStrike a Leader in the 2022 SPARK Matrix for Digital Threat Intelligence Management |
CrowdStrike Intelligence |
Dec 02, 2019 |
2485 |
- |
| Reinventing Managed Detection and Response (MDR) with Identity Threat Protection |
- |
Dec 02, 2019 |
1971 |
- |
| Observability and Your Scrum Team: Break Down Silos and Promote Agility |
- |
Dec 02, 2019 |
1564 |
- |
| December 2022 Patch Tuesday: 10 Critical CVEs, One Zero-Day, One Under Active Attack |
Extended Support Updates |
Dec 02, 2019 |
2205 |
- |
| Achieving Cybersecurity Effectiveness in a World of Advanced Threats |
- |
Dec 02, 2019 |
1464 |
- |
| Attackers Are Trying to Take a Bite Out of the Apple |
- |
Dec 02, 2019 |
1602 |
- |
| Humio Brings Streaming Observability to Fal.Con 2021 |
Ken Greene |
Dec 02, 2019 |
1547 |
- |
| 4.0 Another Brick In The CryptoWall |
- |
Dec 02, 2019 |
3383 |
- |
| October 2023 Patch Tuesday: 104 Vulnerabilities Including Three Actively Exploited Zero-Days |
Microsoft Office |
Dec 02, 2019 |
2475 |
- |
| CrowdStrike Powers MXDR by Deloitte, Offering Customers Risk Mitigation with Powerful Customized and Managed Security Services |
Deloitte |
Dec 02, 2019 |
2077 |
- |
| Critical Infrastructure: One More Thing to Give Thanks For -- and Protect |
- |
Dec 02, 2019 |
1986 |
- |
| Eliminate Repetitive Tasks and Accelerate Response with Falcon Fusion |
- |
Dec 02, 2019 |
2106 |
- |
| Whois Numbered Panda |
AdamM |
Dec 02, 2019 |
1830 |
- |
| February 2024 Patch Tuesday: Two Zero-Days Amid 73 Vulnerabilities |
Extended Security Update |
Dec 02, 2019 |
2272 |
- |
| Introducing AI-Powered Indicators of Attack: Predict and Stop Threats Faster Than Ever |
CrowdStrike |
Dec 02, 2019 |
2449 |
- |
| 2020 Key Findings and Trends From Incident Response and Proactive Services |
- |
Dec 02, 2019 |
1847 |
- |
| Secure AI at Machine Speed: Defending the Growing Attack Surface |
- |
Dec 02, 2019 |
3383 |
- |
| CrowdStrike Named a Leader in the 2019 Forrester Wave for Endpoint Security Suites |
Forrester |
Dec 02, 2019 |
2236 |
- |
| CARBON SPIDER Embraces Big Game Hunting, Part 2 |
CrowdStrike Intelligence |
Dec 02, 2019 |
2442 |
- |
| Business as Usual: Falcon Complete MDR Thwarts Novel VANGUARD PANDA (Volt Typhoon) Tradecraft |
CISA |
Dec 02, 2019 |
3490 |
- |
| macOS Malware Is More Reality Than Myth: Popular Threats and Challenges in Analysis |
CrowdStrike |
Dec 02, 2019 |
2542 |
- |
| CrowdStrike's January Adversary of the Month: VOODOO BEAR |
AdamM |
Dec 02, 2019 |
1484 |
- |
| Know Your Enemy: Exploiting the Dell BIOS Driver Vulnerability to Defend Against It |
CrowdStrike |
Dec 02, 2019 |
5121 |
- |
| November 2022 Patch Tuesday: 10 Critical CVEs, 6 Zero-Days and the Highly Anticipated ProxyNotShell Patches |
Extended Support Updates |
Dec 02, 2019 |
2457 |
- |
| VENOM Vulnerability: Community Patching and Mitigation Update |
FBI Implicates North Korea |
Dec 02, 2019 |
1603 |
- |
| Deploying the Droids: Optimizing Charlotte AI’s Performance with a Multi-AI Architecture |
- |
Dec 02, 2019 |
2426 |
- |
| How CrowdStrike Detects Cloud Storage Misconfigurations to Protect Valuable Data |
Microsoft |
Dec 02, 2019 |
3288 |
- |
| Farewell to Kelihos and ZOMBIE SPIDER |
CrowdStrike |
Dec 02, 2019 |
7384 |
- |
| Enhancing Secure Boot Chain on Fedora 29 |
James Bottomley |
Dec 02, 2019 |
4497 |
- |
| Think It, Build It, Secure It — CrowdStrike at AWS re:Inforce 2022 |
- |
Dec 02, 2019 |
2096 |
- |
| Mo' Shells Mo' Problems - Web Server Log Analysis |
ChadT |
Dec 02, 2019 |
2439 |
- |
| Fal.Con 2021: Introducing CROWDSTRIKE FALCON XDR and CrowdXDR Alliance |
- |
Dec 02, 2019 |
2283 |
- |
| Using OS X FSEvents to Discover Deleted Malicious Artifacts |
- |
Dec 02, 2019 |
2279 |
- |
| Skeletons in the IT Closet: Seven Common Microsoft Active Directory Misconfigurations that Adversaries Abuse |
Dwight Hohnstein |
Dec 02, 2019 |
3763 |
- |
| CrowdStrike Achieves 99% Detection Coverage in First-Ever MITRE ATT&CK Evaluations for Security Service Providers |
MITRE Engenuity |
Dec 02, 2019 |
2350 |
- |
| After Years of Success, State of Wyoming Looks to Expand CrowdStrike Protections Statewide |
CrowdStrike |
Dec 02, 2019 |
2018 |
- |
| CrowdStrike Announces CrowdStrike Falcon Intelligence Recon+ to Combat Cybercriminals |
CrowdStrike Intelligence |
Dec 02, 2019 |
1838 |
- |
| 10 Questions to Help You Choose the Right Log Management Solution |
- |
Dec 02, 2019 |
2155 |
- |
| CrowdStrike Falcon Platform Evolves to Lead the Agentic Security Era |
MCP |
Dec 02, 2019 |
2491 |
- |
| Protected Processes Part 3: Windows PKI Internals (Signing Levels, Scenarios, Signers, Root Keys, EKUs & Runtime Signers) |
AlexI |
Dec 02, 2019 |
5129 |
- |
| Falcon Fusion Accelerates Orchestrated and Automated Response Time |
CrowdStrike Falcon |
Dec 02, 2019 |
2319 |
- |
| How to Establish Cross-Border Transfer Systems that Help Protect Privacy |
Private Sector Entities |
Dec 02, 2019 |
2104 |
- |
| Adversary Quest 2021 Walkthrough, Part 2: Four SPACE JACKAL Hacktivist Challenges |
- |
Dec 02, 2019 |
5671 |
- |
| Domino’s Pizza Eurasia Consolidates Cybersecurity and Slices False Positives by 95% with CrowdStrike |
CrowdStrike |
Dec 02, 2019 |
1998 |
- |
| Mo' Shells Mo' Problems - File List Stacking |
RyanJ |
Dec 02, 2019 |
2204 |
- |
| Announcing Threat AI: Security’s First Agentic Threat Intelligence System |
- |
Dec 02, 2019 |
1994 |
- |
| Holiday Cyber Warnings Will Echo Across 2021 |
CrowdStrike Product Director Scott Taschler |
Dec 02, 2019 |
1486 |
- |
| Solving the Complexity of Azure Identity: Horizon Identity Analyzer |
- |
Dec 02, 2019 |
2192 |
- |
| Humio at Lunar Way: Log Management for a Kubernetes and Cloud Native Environment |
- |
Dec 02, 2019 |
1885 |
- |
| 3 Crucial Capabilities for Effective Cloud Detection and Response |
CrowdStrike |
Dec 02, 2019 |
2051 |
- |
| CrowdStrike’s Approach Echoed in RSA 2020 Theme, “Human Element” |
- |
Dec 02, 2019 |
2321 |
- |
| Evaluating Your Organization's Security Approach: Tips For BOD and C-Level Execs |
- |
Dec 02, 2019 |
2328 |
- |
| CrowdStrike Named the Only Customers’ Choice in 2024 Gartner® “Voice of the Customer” for External Attack Surface Management |
Gartner |
Dec 02, 2019 |
1999 |
- |
| For the Common Good: How to Compromise a Printer in Three Simple Steps |
- |
Dec 02, 2019 |
2815 |
- |
| Parsing Sysmon Events for IR Indicators |
Microsoft Sysinternals |
Dec 02, 2019 |
2579 |
- |
| Data Protection 2022: New U.S. State Laws Reflect Convergence of Privacy and Security Requirements |
- |
Dec 02, 2019 |
1724 |
- |
| Widespread DNS Hijacking Activity Targets Multiple Sectors |
- |
Dec 02, 2019 |
1927 |
- |
| Next-Gen SIEM & Log Management |
Humio
October |
Dec 02, 2019 |
6389 |
- |
| New CrowdStrike Capabilities Simplify Hybrid Cloud Security |
- |
Dec 02, 2019 |
1988 |
- |
| CrowdStrike Named a Leader Again in Gartner 2021 Magic Quadrant for EPP; Placed Furthest on Completeness of Vision |
Gartner |
Dec 02, 2019 |
2118 |
- |
| Start Your Fal.Con 2020 Experience |
SE Labs |
Dec 02, 2019 |
1955 |
- |
| The Evolution of PINCHY SPIDER from GandCrab to REvil |
AdamM |
Dec 02, 2019 |
2560 |
- |
| MITRE ATT&CK Evaluation Reveals CrowdStrike Falcon® as the Most Effective EDR Solution |
GOTHIC PANDA |
Dec 02, 2019 |
2688 |
- |
| CrowdStrike Expands XDR Ecosystem to Give Customers a Data Advantage |
CrowdStrike Intelligence |
Dec 02, 2019 |
2174 |
- |
| Public Sector |
Carahsoft |
Dec 02, 2019 |
2879 |
- |
| 2021 Global Threat Report: Analyzing a Year of Chaos and Courage |
- |
Dec 02, 2019 |
1728 |
- |
| CrowdStrike Falcon® Stops Modern Identity-Based Attacks in Chrome |
CyberArk Labs |
Dec 02, 2019 |
2225 |
- |
| How CrowdStrike Secures AI Agents Across SaaS Environments |
- |
Dec 02, 2019 |
2124 |
- |
| CrowdStrike Named a Leader in the IDC Marketscape: U.S. Incident Readiness, Response and Resiliency Services 2018 Vendor Assessment. |
Christina Richmond |
Dec 02, 2019 |
1911 |
- |
| How to Stay Cyber Aware of Weaknesses and Vulnerabilities in Your Environment |
- |
Dec 02, 2019 |
1899 |
- |
| Webcast Offers Guidance on Adopting the DevOps Model Without Sacrificing Security |
CrowdStrike Falcon |
Dec 02, 2019 |
2418 |
- |
| Global Survey: The Cybersecurity Reality of the COVID-19 Remote Workforce |
- |
Dec 02, 2019 |
2077 |
- |
| Make Ugly Babies Cute Again: An M&A Crisis Aversion Story |
- |
Dec 02, 2019 |
2118 |
- |
| Protect AI Development with Falcon Cloud Security |
- |
Dec 02, 2019 |
2054 |
- |
| Targeted Dharma Ransomware Intrusions Exhibit Consistent Techniques |
Dharma |
Dec 02, 2019 |
3182 |
- |
| Confessions of a Responder: The Hardest Part of Incident Response Investigations |
Falcon Discover |
Dec 02, 2019 |
3231 |
- |
| Podcast Features George Kurtz on What it Takes to Build a Unicorn |
Larry Walsh |
Dec 02, 2019 |
2225 |
- |
| Adversary Quest 2021 Walkthrough, Part 1: Four CATAPULT SPIDER eCrime Challenges |
CATAPULT SPIDER |
Dec 02, 2019 |
8074 |
- |
| Why We Chose Elm for Humio’s Web UI |
Richard Feldman |
Dec 02, 2019 |
3299 |
- |
| I Know What You Did Last Month: A New Artifact of Execution on macOS 10.13 |
CoreAnalyticsParser |
Dec 02, 2019 |
3765 |
- |
| CrowdStrike Named a Frost Radar™ Leader in Cloud Workload Protection Platforms |
- |
Dec 02, 2019 |
1940 |
- |
| The Dawn of the Agentic SOC: Reimagining Cybersecurity for the AI Era |
- |
Dec 02, 2019 |
2022 |
- |
| CrowdStrike Boosts SOC Detection Content with Correlation Rule Template Discovery Dashboard |
MITRE ATT |
Dec 02, 2019 |
2445 |
- |
| CrowdStrike’s Fall 2025 Release Defines the Agentic SOC and Secures the AI Era |
CrowdStrike |
Dec 02, 2019 |
3611 |
- |
| How Falcon ASPM Secures GenAI Applications and Lessons from Dogfooding |
- |
Dec 02, 2019 |
2401 |
- |
| CrowdStrike Identifies Campaign Targeting Oracle E-Business Suite via Zero-Day Vulnerability (now tracked as CVE-2025-61882) |
- |
Dec 02, 2019 |
2280 |
- |
| CrowdStrike Named a Visionary in 2025 Gartner® Magic Quadrant™ for Security Information and Event Management |
Gartner |
Dec 02, 2019 |
2433 |
- |
| October 2025 Patch Tuesday: Two Publicly Disclosed, Three Zero-Days, and Eight Critical Vulnerabilities Among 172 CVEs |
Microsoft Office |
Dec 02, 2019 |
3771 |
- |
| Windows 10 End of Support: How to Stay Protected |
Microsoft |
Dec 02, 2019 |
1900 |
- |
| How CrowdStrike Stops Living-off-the-Land Attacks |
- |
Dec 02, 2019 |
2056 |
- |
| Falcon Insight for ChromeOS Adds Automated Response Actions and GovCloud Support |
- |
Dec 02, 2019 |
1857 |
- |
| Falcon Defends Against Git Vulnerability CVE-2025-48384 |
GraphExplorer |
Dec 02, 2019 |
1986 |
- |
| How Falcon Exposure Management’s ExPRT.AI Predicts What Attackers Will Exploit |
- |
Dec 02, 2019 |
2714 |
- |
| Ransomware Reality: Business Confidence Is High, Preparedness Is Low |
- |
Dec 02, 2019 |
1821 |
- |
| CrowdStrike 2025 APJ eCrime Landscape Report: A New Era of Threats Emerges |
- |
Dec 02, 2019 |
1800 |
- |
| New User Experience Transforms Interaction with the Falcon Platform |
CrowdStrike Enterprise Graph |
Dec 02, 2019 |
1874 |
- |
| From Domain User to SYSTEM: Analyzing the NTLM LDAP Authentication Bypass Vulnerability (CVE-2025-54918) |
Lee Christensen |
Dec 02, 2019 |
2928 |
- |
| CrowdStrike Named the Leader in 2025 Frost Radar for SaaS Security Posture Management |
Charlotte AI |
Dec 02, 2019 |
2068 |
- |
| CrowdStrike Falcon Achieves 100% Protection and Accuracy in SE Labs Endpoint Protection Evaluation |
- |
Dec 02, 2019 |
2121 |
- |
| CrowdStrike 2025 European Threat Landscape Report: Extortion Rises, Nation-State Activity Intensifies |
BGH |
Dec 02, 2019 |
1891 |
- |
| CrowdStrike Expands Agentic Security Workforce with New Agents |
Charlotte Agentic SOAR |
Dec 02, 2019 |
2156 |
- |
| Falcon for XIoT Innovations Improve Speed and Visibility in OT Networks |
- |
Dec 02, 2019 |
2059 |
- |
| CrowdStrike Leads New Evolution of Security Automation with Charlotte Agentic SOAR |
Charlotte AI |
Dec 02, 2019 |
1934 |
- |
| How the Falcon Platform Delivers Fast, CISO-Ready Executive Reports |
CrowdStrike |
Dec 02, 2019 |
2307 |
- |
| CrowdStrike Named Overall Leader in 2025 KuppingerCole ITDR Leadership Compass |
KuppingerCole |
Dec 02, 2019 |
1887 |
- |
| November 2025 Patch Tuesday: One Zero-Day and Five Critical Vulnerabilities Among 63 CVEs |
Microsoft Office |
Dec 02, 2019 |
2729 |
- |
| From Vulnerability Management to Exposure Management: The Platform Era Has Arrived |
- |
Dec 02, 2019 |
2227 |
- |
| To Stop AI-Powered Adversaries, Defenders Must Fight Fire with Fire |
CrowdStrike |
Dec 02, 2019 |
2347 |
- |
| Defeating BLOCKADE SPIDER: How CrowdStrike Stops Cross-Domain Attacks |
- |
Dec 02, 2019 |
1986 |
- |
| CrowdStrike Research: Security Flaws in DeepSeek-Generated Code Linked to Political Triggers |
Chinese |
Dec 02, 2019 |
3549 |
- |
| Falcon Data Protection for Cloud Extends DSPM into Runtime |
- |
Dec 02, 2019 |
2010 |
- |
| CrowdStrike Leverages NVIDIA Nemotron in Amazon Bedrock to Advance Agentic Security |
Defenders |
Dec 02, 2019 |
1661 |
- |
| CrowdStrike Unveils Real-Time Cloud Detection and Response Innovations |
MURKY PANDA |
Dec 02, 2019 |
1884 |
- |
| Transform AWS Security Operations with Falcon Next-Gen SIEM |
- |
Dec 02, 2019 |
2067 |
- |
| Indirect Prompt Injection Attacks: A Lurking Risk to AI Systems |
Gusto |
Dec 02, 2019 |
2061 |
- |
| Unveiling WARP PANDA: A New Sophisticated China-Nexus Adversary |
WARP PANDAVulnerabilityDescriptionCVE |
Dec 02, 2019 |
3096 |
- |
| Falcon Shield Evolves with AI Agent Visibility and Falcon Next-Gen SIEM Integration |
- |
Dec 02, 2019 |
2155 |
- |
| CrowdStrike Achieves 100% Detection, 100% Protection, and Zero False Positives in 2025 MITRE ATT&CK® Enterprise Evaluations |
MITRE |
Dec 02, 2019 |
3028 |
- |
| December 2025 Patch Tuesday: One Critical Zero-Day, Two Publicly Disclosed Vulnerabilities Among 57 CVEs |
Microsoft Office |
Dec 02, 2019 |
2250 |
- |
| Data Leakage: AI’s Plumbing Problem |
- |
Dec 02, 2019 |
2470 |
- |
| Inside the Latest Innovations Powering Falcon Exposure Management |
ExPRT |
Dec 02, 2019 |
3283 |
- |