recent Articles
Using Artificial Intelligence and Machine Learning to Combat Hands-on-Keyboard Cybersecurity Attacks
Malware gets the headlines, but the bigger threat is hands-on-keyboard adversary activity which can evade traditional security solutions and present detection challenges Machine learning (ML) can predict and proactively[...]
CrowdStrike Announces Expanded Service Integrations with AWS
At AWS re:Invent 2022, CrowdStrike announced expanded service integrations with AWS to provide breach protection across your AWS environment, simplified infrastructure management and security consolidation. On January 31, 2023, AWS[...]
Small Business Cyberattack Analysis: Most-Targeted SMB Sectors and Key Prevention Tips
Cybercriminals more frequently target small and medium-sized businesses (SMBs) than large companies, often due to SMBs’ lack of security resources SMBs in the not-for-profit and transportation sectors face more[...]
How Adversaries Can Persist with AWS User Federation
CrowdStrike Services identified a novel technique used by threat actors that escapes typical containment practices and permits persistence in victim AWS environments. The technique requires that the adversary first[...]
Data Protection Day 2023: Misaligned Policy Priorities Complicate Data Protection Compliance
January 28 is recognized as Data Protection Day in Europe, the United States and dozens of other countries including Canada and Israel. It provides a moment to reflect on where[...]
Securing PostgreSQL from Cryptojacking Campaigns in Kubernetes
PostgreSQL misconfiguration allows running shell commands on the underlying OS with the “COPY” SQL command and “pg_execute_server_program” role Kubernetes ingress can allow access to the PostgreSQL service, which can[...]
Importing Logs from FluentD into Falcon LogScale
One of the primary debugging tools for a cloud-native developer is the simple, humble log file. Some malfunctioning systems can be impossible to debug without them. FluentD is an open source[...]
3 Easy Steps for End-to-End XDR with CrowdStrike and Zscaler
Hybrid working models have increasingly become the normal way of doing business. Employees are working from anywhere, users and their devices are moving on and off the office network, and[...]
Importing Logs from Logstash into Falcon LogScale
Logging is an important tool in the cloud developer’s toolbox. It can be the critical component used to discover why your authentication service can’t connect to its database or why[...]
Exploiting CVE-2021-3490 for Container Escapes
Today, containers are the preferred approach to deploy software or create build environments in CI/CD lifecycles. However, since the emergence of container solutions and environments like Docker and Kubernetes, security[...]