recent Articles
Mirai Malware Variants for Linux Double Down on Stronger Chips in Q1 2022
According to CrowdStrike research, Mirai malware variants compiled for Intel-powered Linux systems double (101%) in Q1 2022 compared to Q1 2021 Mirai malware variants that targeted 32-bit x86 processors increased the most (120% in Q1 2022 vs. Q1 2021) Mirai malware is used to compromise internet-connected devices, amass them into botnets and use their collective […]
CrowdStrike Cloud Security Extends to New Red Hat Enterprise Linux Versions
As organizations increasingly move to hybrid cloud environments to increase agility, scale and competitive advantage, adversaries are correspondingly looking to exploit these environments. According to the CrowdStrike 2022 Global Threat Report, cloud-based services are “increasingly abused by malicious actors in the course of computer network operations (CNO), a trend that is likely to continue in […]
CrowdStrike Named an Overall Leader in 2022 KuppingerCole Leadership Compass for EPDR Market
CrowdStrike is proud to announce its recognition as an Overall Leader with the highest rating in the 2022 KuppingerCole Leadership Compass for vendors in the Endpoint Protection, Detection & Response (EPDR) market. The Overall Leadership ranking provides a combined view of ratings across Product, Innovation and Market Leadership categories. Our acknowledgement as an Overall Leader […]
Follow the Money: How eCriminals Monetize Ransomware
The transaction details and monetization patterns of modern eCrime reveal critical insights for organizations defending against ransomware attacks. Cybercrime has evolved over the past several years from simple “spray and pray” attacks to a sophisticated criminal ecosystem centered around highly effective monetization techniques that enable adversaries to maximize success and profitability. Monetization is the step […]
Denise Stemen, CrowdStrike Director of Customer Crisis Strategy and Response, on Bringing Inclusivity to Life
If you’re a CrowdStrike client or partner working with Denise Stemen, our new Director of Customer Crisis Strategy and Response, know that you’re in good hands. After 22 years in the Federal Bureau of Investigation (FBI) — plus 10 years before that teaching in public schools — Denise knows how to bring calm and order […]
CrowdStrike Falcon Pro for Mac Achieves Highest Score in AV-TEST MacOS Evaluation for Business Users (March 2022)
CrowdStrike Falcon® achieves the maximum score of 18 points in the first 2022 AV-TEST MacOS evaluation for business users AV-TEST is an independent research institute for IT security that performs quality-assuring comparison and tests for security products Falcon demonstrates excellent protection, performance and visibility against MacOS threats, with zero false alarms, using the power of […]
One engineer. One day. One petabyte of log data.
This blog was originally published March 8, 2022 on humio.com. Humio is a CrowdStrike Company. Humio recently unveiled the results of its latest benchmark, where the log management platform achieved a new benchmark of 1 petabyte (PB) of streaming log ingestion per day. This benchmark showcases the power of Humio and its ability to scale with […]
May 2022 Patch Tuesday: Six Critical CVEs Fixed and a Windows Vulnerability Actively Exploited
Microsoft has released 73 security patches for its May Patch Tuesday rollout. One of the 73 CVEs addressed, Windows LSA Spoofing Vulnerability CVE-2022-26925, is ranked as Important and is under active exploitation. In this blog, the CrowdStrike Falcon Spotlight™ team offers an analysis on this month’s vulnerabilities, highlighting those that are most severe and recommending […]
Proactive Threat Hunting Bears Fruit: Falcon OverWatch Detects Novel IceApple Post-Exploitation Framework
The CrowdStrike Falcon OverWatch™ proactive threat hunting team has uncovered a sophisticated .NET-based post-exploitation framework, dubbed IceApple. Since OverWatch’s first detection in late 2021, the framework has been observed in multiple victim environments in geographically distinct locations, with intrusions spanning the technology, academic and government sectors. The emergence of new and evolving IceApple modules over […]
CrowdStrike Partners with Center for Threat-Informed Defense to Reveal Top Attack Techniques Defenders Should Prioritize
CrowdStrike is a Research Sponsor and contributor for the new Top ATT&CK Techniques project — an initiative of the Center for Threat-Informed Defense, a non-profit, privately funded research and development organization operated by MITRE Engenuity — to provide prioritization for adversary attack techniques The Center for Threat-Informed Defense will introduce three critical new components to […]