A Real-World Story of Stopping Malware-free Intrusions
When we tell customers that malware is just a minor part of the overall security breach problem, they often ask…
Bear Hunting: Tracking Down COZY BEAR Backdoors
As a follow-up to the CrowdStrike blog entry "Bears in the Midst" on June 15, 2016, we will walk through…
How to Manage Updates in Falcon
Introduction The Falcon Sensor updated is automated through CrowdStrike. Updating a sensor takes no effort on the part of the users.…
There is nothing more important than your health
It’s a common saying, and who would argue against it? The majority of us take our health very seriously. Our…
Who Is COZY BEAR?
The sophisticated threat actor COZY BEAR was initially identified in 2014. This actor has many other names in the…
Who is FANCY BEAR?
The nation-state adversary group known as FANCY BEAR has been operating since at least 2008 and represents a constant threat…
CrowdStrike Machine Learning and VirusTotal
Over the past three months, CrowdStrike worked closely with VirusTotal (VT), and we are excited to announce the integration of…
CrowdStrike Integrates Falcon Machine Learning Engine into VirusTotal
I am delighted to announce that CrowdStrike is the first company to integrate its signatureless machine learning engine into the…
How to Roll Out Your Own Threat Intelligence Team
Amidst a rapidly evolving threat landscape, many organizations are looking to integrate threat intelligence into their security operations but don’t…
Seeing the Forest For the Trees: How Proactive Threat Hunting Stops the Mega-Breach
In a recent CrowdCast webinar, CrowdStrike’s Senior Director of Hunting Operations, Kris Merritt, discusses core problems associated with automating cybersecurity…