X

Our website uses cookies to enhance your browsing experience.

CONTINUE TO SITE >
Convolutional Neural Networks Are MALE Models For PE Malware

Convolutional Neural Networks Are MALE Models for PE Malware

Machine learning for computer security has enjoyed a number of recent successes, but these tools aren’t perfect, and sometimes a…

READ MORE
How To Sniff Out (and Block) BloodHound Attacks

How to Sniff Out (and Block) BloodHound Attacks

The growing adversary focus on “big game hunting” (BGH) in ransomware attacks — targeting organizations and data that offer a higher…

READ MORE
Building A String-Based Machine Learning Model To Detect Malicious Activity

Building a String-Based Machine Learning Model to Detect Malicious Activity

Working with text data (which we often refer to as “strings”) is common in cybersecurity applications. For example, suppose we…

READ MORE
Gimme Shellter

Gimme Shellter

Red team penetration testers very often add tools to their arsenal that borrow techniques originating in malicious software. Shellter is…

READ MORE
CrowdStrike’s Approach Echoed In RSA 2020 Theme, “Human Element”

CrowdStrike’s Approach Echoed in RSA 2020 Theme, “Human Element”

Another year has raced by, and RSA 2020 is only weeks away. CrowdStrike® is gearing up for our best event…

READ MORE
Common Attacks And Effective Mitigation: 2020 CrowdStrike Services Report Key Findings (Part 2 Of 2)

Common Attacks and Effective Mitigation: 2020 CrowdStrike Services Report Key Findings (Part 2 of 2)

Your organization is constantly under attack, and every day, adversaries are developing new ways to breach your network. How can…

READ MORE
Know Your Attackers: 2020 CrowdStrike Services Report Key Findings (Part 1 Of 2)

Know Your Attackers: 2020 CrowdStrike Services Report Key Findings (Part 1 of 2)

The cybersecurity landscape is always evolving, but one thing remains constant: Cyber adversaries continue to be relentless and innovative in…

READ MORE
CrowdStrike Delivers Protection For Critical Windows Certificate Spoofing Vulnerability

CrowdStrike Delivers Protection for Critical Windows Certificate Spoofing Vulnerability

Microsoft recently disclosed a critical vulnerability (CVE-2020-0601) that could be leveraged for a wide range of malicious actions including spoofing…

READ MORE
Large-Scale Endpoint Security MOLD Remediation

Large-Scale Endpoint Security MOLD Remediation

While adversaries continue to evolve their cyberattacks, CrowdStrike® scientists and engineers keep pushing the boundaries of what’s achievable in malware…

READ MORE
CrowdStrike’s Work With The Democratic National Committee: Setting The Record Straight

CrowdStrike’s work with the Democratic National Committee: Setting the record straight

CrowdStrike is non-partisan - we routinely work with both Republican and Democratic organizations to protect them from cyber-attacks - along…

READ MORE
 

Try CrowdStrike Free for 15 Days Get Started with A Free Trial