The Critical Role of Cybersecurity in M&A: Part 3, Post-Close
In the post-close phase of an M&A transaction, the deal may be done but the job of integration has just begun. From…
In the post-close phase of an M&A transaction, the deal may be done but the job of integration has just begun. From…
This is Part 2 of our three-part blog series on the critical importance of cybersecurity in the M&A process. Part 1 addressed…
COVID-19 has disrupted virtually every aspect of business, and the mergers and acquisitions (M&A) pipeline is no exception. However, while overall M&A…
This blog is the last in a three-part series presenting the CrowdStrike® Falcon Complete™ team’s analysis of the recent QakBot campaigns observed…
Threat hunting is the discipline of employing human analysts to actively search for and disrupt distinctly human threats. It leverages smart and…
This blog is Part 2 of a three-part blog series detailing the reemergence and evolution of QakBot in the spring and summer…
Adversaries constantly develop new tactics that enhance their capabilities to deploy malware across networked environments and monetize infected systems. This blog is…
In recent months, CrowdStrike® Services has observed a continued increase in the use of Cobalt Strike by eCrime and nation-state adversaries to…
CrowdStrike® Falcon OverWatch™ has released its new report, 2020 Threat Hunting Report: Insights from the CrowdStrike Falcon OverWatch Team. Now in its…
In this blog, we describe a recent incident that highlights the CrowdStrike® Falcon Complete™ team’s ability to act as an extension of…