The Evolution of PINCHY SPIDER from GandCrab to REvil
For years, ransomware was a nuisance that impacted individuals who were unfortunate enough to encounter it via banking trojans, exploit…
Testing Data Flows Using Python and Remote Functions
One common challenge facing cloud engineers is how to develop and run tests that are distributed across multiple clusters, teams,…
CrowdStrike UK’s First Cloud Engineer on the Endless Opportunities to Shift and Grow Your Skills
When Garry Bodsworth started at CrowdStrike nearly four years ago, he was our company’s first cloud engineer in the UK.…
Stop Cloud Breaches With Threat Graph Cloud-Powered Analytics: Intelligent, Automated, Accurate
Drawing benefits from CrowdStrike’s network effect requires handling large amounts of data — volumes and volumes of it. In fact,…
CrowdStrike Services Releases AutoMacTC 1.2.0
The CrowdStrike Services team is excited to announce the release of AutoMacTC 1.2.0 to the community. AutoMacTC was originally released…
The Power of Winning Together: Partners Help CrowdStrike Win Recognition Awards and Races
Right from Day One, CrowdStrike has embraced a partner-first and community driven approach to protect customers against modern cyberattacks. It’s…
A Conversation on the Trans Experience and Embracing Who You Really Are With Accessibility Engineer Zoë Bijl
June is Pride Month in the U.S., a time to give the metaphorical mic to people within the LGBTQIA+ community…
New Ransomware Variant Uses Golang Packer
CrowdStrike recently observed a ransomware sample borrowing implementations from previous HelloKitty and FiveHands variants and using a Golang packer compiled…
The Myth of Part-time Hunting, Part 1: The Race Against Ever-diminishing Breakout Times
The term “threat hunting” is increasingly thrown around the cybersecurity industry as a catch-all for any proactive or human-lead defensive…
The Importance of Integrated Endpoint and Workload Protection for IT and Security Operations
Countless headlines report what we already know all too well: No matter how advanced cybersecurity prevention tools are, with enough…