Response When Minutes Matter: A Simple Clue Uncovers a Global Attack Campaign
In this blog, we describe a recent incident that highlights the CrowdStrike® Falcon Complete™ team’s ability to act as an…
Finding Waldo: Leveraging the Apple Unified Log for Incident Response
As of macOS 10.12 Sierra, incident responders have been able to turn to a new endpoint log source for investigative…
The Current State of Exploit Development, Part 2
In Part 1 of this two-part blog series, we addressed binary exploitation on Windows systems, including some legacy and contemporary…
Accelerate Your Digital Transformation With the Falcon Platform’s Unified Approach to Security
CrowdStrike continues to deliver a variety of innovative solutions from trusted technology partners, and we’ve just added three new applications…
Response When Minutes Matter: RDP — Remote Desktop Pwnage, Part 2
In Part 1 of this two-part “Tales from the Trenches” blog, we examined a stealthy Remote Desktop Protocol (RDP) intrusion…
Response When Minutes Matter: RDP — Remote Desktop Pwnage, Part 1
Welcome to the CrowdStrike® Falcon CompleteTM team’s first “Tales from the Trenches” blog, where we describe a recent intrusion that…
The Current State of Exploit Development, Part 1
Memory corruption exploits have historically been one of the strongest accessories in a good red teamer's toolkit. They present an…
Fal.Con 2020: Going Beyond Today’s Typical Virtual Event
Nine years ago, we built CrowdStrike in the cloud, pioneering new technologies and rocketing our way to the forefront of…
Securing Elections Globally: How CrowdStrike Is Helping
As a global leader in protecting elections, we want to explain our perspective on election security issues and share some…
Memorizing Behavior: Experiments with Overfit Machine Learning Models
In this blog, we present the results of some preliminary experiments with training highly “overfit” (interpolated) models to identify malicious…