FEATURED ARTICLES

Response When Minutes Matter: A Simple Clue Uncovers A Global Attack Campaign

Response When Minutes Matter: A Simple Clue Uncovers a Global Attack Campaign

In this blog, we describe a recent incident that highlights the CrowdStrike® Falcon Complete™ team’s ability to act as an…

READ MORE
Finding Waldo: Leveraging The Apple Unified Log For Incident Response

Finding Waldo: Leveraging the Apple Unified Log for Incident Response

As of macOS 10.12 Sierra, incident responders have been able to turn to a new endpoint log source for investigative…

READ MORE
The Current State Of Exploit Development, Part 2

The Current State of Exploit Development, Part 2

In Part 1 of this two-part blog series, we addressed binary exploitation on Windows systems, including some legacy and contemporary…

READ MORE
Accelerate Your Digital Transformation With The Falcon Platform’s Unified Approach To Security

Accelerate Your Digital Transformation With the Falcon Platform’s Unified Approach to Security

CrowdStrike continues to deliver a variety of innovative solutions from trusted technology partners, and we’ve just added three new applications…

READ MORE
Response When Minutes Matter: RDP — Remote Desktop Pwnage, Part 2

Response When Minutes Matter: RDP — Remote Desktop Pwnage, Part 2

In Part 1 of this two-part “Tales from the Trenches” blog, we examined a stealthy Remote Desktop Protocol (RDP) intrusion…

READ MORE
Response When Minutes Matter: RDP — Remote Desktop Pwnage, Part 1

Response When Minutes Matter: RDP — Remote Desktop Pwnage, Part 1

Welcome to the CrowdStrike® Falcon CompleteTM team’s first “Tales from the Trenches” blog, where we describe a recent intrusion that…

READ MORE
The Current State Of Exploit Development, Part 1

The Current State of Exploit Development, Part 1

Memory corruption exploits have historically been one of the strongest accessories in a good red teamer's toolkit. They present an…

READ MORE
Fal.Con 2020: Going Beyond Today’s Typical Virtual Event

Fal.Con 2020: Going Beyond Today’s Typical Virtual Event

Nine years ago, we built CrowdStrike in the cloud, pioneering new technologies and rocketing our way to the forefront of…

READ MORE
Securing Elections Globally: How CrowdStrike Is Helping

Securing Elections Globally: How CrowdStrike Is Helping

As a global leader in protecting elections, we want to explain our perspective on election security issues and share some…

READ MORE
Memorizing Behavior: Experiments With Overfit Machine Learning Models

Memorizing Behavior: Experiments with Overfit Machine Learning Models

In this blog, we present the results of some preliminary experiments with training highly “overfit” (interpolated) models to identify malicious…

READ MORE
 

Try CrowdStrike Free for 15 Days Get Started with A Free Trial