‘Tis the Season for Account Thievin’
Brooklyn born Willie Sutton made a career in crime; robbing banks and jewelry stores often in disguise earning him the nickname “The…
Brooklyn born Willie Sutton made a career in crime; robbing banks and jewelry stores often in disguise earning him the nickname “The…
As a follow-up to the CrowdStrike blog entry "Bears in the Midst" on June 15, 2016, we will walk through the methods…
The sophisticated threat actor COZY BEAR was initially identified in 2014. This actor has many other names in the information security community,…
At our inception, CrowdStrike coined the phrase, “You don’t have a malware problem, you have an adversary problem.” Behind every attack --…
Mergers and acquisitions: Many organizations utilize these activities to move their business forward by expanding into different market segments or gaining competitive…
On the morning of 24 November 2015 an F-16 operated by the Turkish Air Force dropped into position behind a Russian Su-24…
File System Events (FSEvents) in OS X 10.7+ introduced the capability to monitor changes to a directory. FSevents are logged by the…
PowerShell is becoming ubiquitous in the Microsoft ecosystem, and, while it simplifies administration, it opens up a nearly unprecedented suite of capabilities…
Over the past several years an increasing number of organizations have turned to threat intelligence to counter the aggressions of various adversaries…
Update: CrowdStrike's 2020 Global Threat Report is now available! Download the report to stay ahead of today's adversaries. With every year that…