2020 Key Findings and Trends From Incident Response and Proactive Services
The annual CrowdStrike Services Cyber Front Lines Report released this month shares statistics, trends and themes gleaned from a year’s…
CrowdStrike Launches Free Tool to Identify and Help Mitigate Risks in Azure Active Directory
Executive Summary CrowdStrike launches CrowdStrike Reporting Tool for Azure (CRT), a free community tool that will help organizations quickly and…
Leftover Lunch: Finding, Hunting and Eradicating Spicy Hot Pot, a Persistent Browser Hijacking Rootkit
In this blog, we take a look at a recent incident that involved a persistent browser hijacking rootkit dubbed “Spicy…
CrowdStrike Falcon Forensics: Ditch Inefficient Incident Response Tools for Good
There’s nothing like the pressure incident responders encounter when an attacker attempts to breach their organization. They often struggle with…
Hiding in Plain Sight: Remediating “Hidden” Malware with Real Time Response
Malware remediation is not always clear-cut. In this blog post, the CrowdStrike® Falcon Complete™ and Endpoint Recovery Services teams take…
The Imperative to Secure Identities: Key Takeaways from Recent High-Profile Breaches
The recent public disclosure regarding SolarWinds’ software being leveraged by advanced attackers, as well as FireEye’s disclosure of stolen red…
Join CrowdStrike at AWS re:Invent 2020
CrowdStrike is proud to be a Gold Sponsor of AWS re:Invent 2020, the world’s largest and most comprehensive cloud computing…
This Year’s CrowdStrike Services Report Offers Observations on 2020 Cyber Threat Trends and Insights for 2021
The CrowdStrike Services team has issued its latest report: “CrowdStrike Services Cyber Front Lines Report: Observations From the Front Lines…
CrowdStrike Offers Cybersecurity Professional Services in AWS Marketplace
Digital transformation initiatives are accelerating the adoption of cloud technologies across industries as organizations look to evolve their business processes…
How Falcon Horizon Ensures Secure Authentication to Customer Clouds
One of the biggest challenges of the cloud today is properly configuring resources to prevent breaches. Various breaches have proven…