Protecting the Software Supply Chain: Deep Insights into the CCleaner Backdoor
The term “supply chain attacks” means different things to different people. To the general business community, it refers to attacks targeting vulnerable…
The term “supply chain attacks” means different things to different people. To the general business community, it refers to attacks targeting vulnerable…
Making the world a better place has always been a core goal of CrowdStrike. In this blog post, we are making our…
Update: Due to naming convention consistency in the industry, CrowdStrike is now calling this variant of Petya - NotPetya. On June 27…
Wanna Decryption Ransom Screen Wanna (also known as WannaCry, WCry, WanaCrypt and WanaCrypt0r) ransomware exploded onto the ransomware scene on May 12,…
This figure shows a snapshot of systems infected with Kelihos communicating with the sinkhole created to disable it. The arrest of Russian…
CrowdStrike Falcon™ Intelligence, powered by the CrowdStrike Global Intelligence Team, received top honors from SC Magazine with the highest possible rating of five…
CrowdStrike CrowdInspect version 1.5.0.0 has arrived. Many of you are familiar with CrowdInspect, a simple-to-use and understand Windows application that lists processes…
As a next-gen endpoint protection solution, uniquely unifying next-gen antivirus with endpoint detection and response, CrowdStrike Falcon™ provides a unique view of…
The high-profile hack of the Democratic National Committee (DNC) was one of many damaging cyber attacks that plagued organizations in 2016. The…
Update - As of March 2017, the estimated losses of D-30 howitzer platform have been amended. According to an update provided by…