RECENT ARTICLES

Double Trouble: Ransomware With Data Leak Extortion, Part 2

Double Trouble: Ransomware with Data Leak Extortion, Part 2

As data leak extortion swiftly became the new norm for big game hunting (BGH) ransomware operators since late 2019, various…

READ MORE
Fast Response To Sophisticated Threats: OverWatch Incidents

Fast Response to Sophisticated Threats: OverWatch Incidents

Introduction Threat hunting leverages skilled defenders to hunt actively for the faintest signs of advanced attacks. OverWatch is CrowdStrike’s managed…

READ MORE
How Principal Writer Elly Searle Makes The Highly Technical Seem Completely Human

How Principal Writer Elly Searle Makes the Highly Technical Seem Completely Human

Elly Searle is a champion of user experience, a behind-the-scenes engineer, a client mentor and a technical translator. She is…

READ MORE
Duck Hunting With Falcon Complete: Analyzing A Fowl Banking Trojan, Part 1

Duck Hunting with Falcon Complete: Analyzing a Fowl Banking Trojan, Part 1

Adversaries constantly develop new tactics that enhance their capabilities to deploy malware across networked environments and monetize infected systems. This…

READ MORE
Only The Transformational Will Survive

Only the Transformational Will Survive

The title of this blog might seem harsh, but in today's world we are in uncharted territory and the cold…

READ MORE
Getting The Bacon From The Beacon

Getting the Bacon from the Beacon

In recent months, CrowdStrike® Services has observed a continued increase in the use of Cobalt Strike by eCrime and nation-state…

READ MORE
Custom Dashboard Offers Greater Visibility For Zerologon Vulnerability

Custom Dashboard Offers Greater Visibility for Zerologon Vulnerability

A serious and potentially dire patch warning has been issued by the Department of Homeland Security (DHS) advisory team, the…

READ MORE
Double Trouble: Ransomware With Data Leak Extortion, Part 1

Double Trouble: Ransomware with Data Leak Extortion, Part 1

The most prominent eCrime trend observed so far in 2020 is big game hunting (BGH) actors stealing and leaking victim…

READ MORE
CrowdStrike Plans To Advance Zero Trust Capabilities With Acquisition Of Preempt Security 

CrowdStrike Plans to Advance Zero Trust Capabilities with Acquisition of Preempt Security 

In 2020, we saw a rapid shift to digital transformation, accelerating the adoption of cloud technologies across industries. This secular…

READ MORE
Offline Protection For Remote Systems

Offline Protection for Remote Systems

Introduction Remote working has many employees not only working from home but really from anywhere. Services necessary to work remotely…

READ MORE
 

Try CrowdStrike Free for 15 Days Get Started with A Free Trial