Preventing Exploitation of the ZIP File Format
ZIP files are a known vector for phishing campaigns, ransomware and other malicious action. Because the format isn’t generally executable…
Incident Response Engineer Yuichi Uzawa on Working with Fast Forensics at Scale
Like many of our regions around the world, CrowdStrike Japan is growing at a steady clip. Over the past year,…
Response When Minutes Matter: Falcon Complete Disrupts WIZARD SPIDER eCrime Operators
In this blog, we describe a string of recent incidents in which the CrowdStrike Falcon Complete™ team observed a financially…
CrowdStrike Falcon Platform Positioned for CMMC
As the threat environment rapidly evolves with more targeted and sophisticated attacks on the supply chain and critical infrastructure, the…
GDPR at Three Years: Risk Takes On New Meaning
May 25, 2021, marked three years since the European Union’s General Data Protection Regulation, commonly referred to as GDPR, went…
Ransomware Actors Evolved Their Operations in 2020
In 2020, CrowdStrike Services observed the continued evolution and proliferation of eCrime adversaries engaging in big game hunting (BGH) ransomware…
Grafana Alerting in a Multi-cloud World
Why “Alerts as Code” is a winning strategy for system maintenance and analysis While running multiple, independent clouds offers organizations…
Will Kormos on the Unique Qualities of His SDET Role
At CrowdStrike, it’s not uncommon for employees to have multifaceted roles. Just ask Will Kormos, a computer engineer whose job…
Seven Words That Could Stall Any Woman’s Career Path
“You can’t be what you can’t see.” It’s a saying that has been circulating in networking events and professional development…
Community Power: The CrowdStrike Security Cloud Network Effect
There’s a popular saying that it takes a village to raise a child. The cybersecurity version of this idiom is…