Credential Theft: An Adversary Favorite
Stealthy and Powerful CrowdStrike frequently observes adversaries using valid account credentials across the attack lifecycle. In fact, credential dumping, an illegal way…
Stealthy and Powerful CrowdStrike frequently observes adversaries using valid account credentials across the attack lifecycle. In fact, credential dumping, an illegal way…
Dr. Sven Krasser, CrowdStrike® chief scientist, has called machine learning (ML) the first line of defense against modern threats. That statement, which…
A recent product review in CSO Magazine titled, “CrowdStrike Falcon Breaks the EDR Mold,” explains how the CrowdStrike® Falcon endpoint detection and…
Media coverage of cybersecurity breaches would lead us to believe that sophisticated, targeted attacks are reserved for well-known enterprise organizations. Searching the…
While there is much discussion today about potential weaknesses in the hardware supply chain, given the recent attacks attributed to China, the…
PowerShell is a scripting language originally designed to automate Windows administrative tasks. In addition to running its native commands, it can call…
The shortage of resources and expertise is quickly becoming a major cybersecurity concern, but the problem is not new. In 2015, Frost…
The impending enforcement of the General Data Protection Regulation (GDPR) on May 25, 2018 has many organizations scrambling to ensure compliance before…
If there’s one term that vendors love to attach to their security solutions, it’s “next-gen.” This is especially true for endpoint security…
One of the findings in the 2017 Verizon Data Breach Investigations Report (DBIR) is that only 51 percent of cyberattacks involve malware.…