Visit CrowdStrike at Black Hat 2018
CrowdStrike® is excited to join more than 17,000 security experts in Las Vegas this August for Black Hat USA, one of the…
CrowdStrike® is excited to join more than 17,000 security experts in Las Vegas this August for Black Hat USA, one of the…
Introduction This blog introduces some of the innovative techniques the CrowdStrike Data Science team is using to address the unique challenges inherent…
Update: While this blog post originally covered the Office 365 Activities API, that functionality has been disabled by Microsoft as of Friday,…
Introduction This analysis provides an in-depth view of the Samsam ransomware, which is developed and operated by the actor tracked by CrowdStrike®…
Introduction This blog tells the story of a failed Samba exploitation attempt. The goal was to assess what it would take for…
Defending an organization from today’s sophisticated attacks is no easy task. It often requires security teams to be ready at a moment’s…
Cryptocurrencies are in high demand. The usage and monetary value of Bitcoin, Litecoin, Ethereum, and many others have skyrocketed worldwide. The increase…
The much-anticipated CrowdStrike® Cyber Intrusion Services Casebook for 2017 offers detailed accounts of some of the cases the CrowdStrike Services incident response…
The latest computer flaws to make global headlines are ominously titled “Spectre” and “Meltdown” and they represent a unique breed of trouble,…
Overview This post continues the technical analysis of the BadRabbit ransomware attacks discussed in Part One of this two-part series. Part…