Double Trouble: Ransomware with Data Leak Extortion, Part 2
As data leak extortion swiftly became the new norm for big game hunting (BGH) ransomware operators since late 2019, various…
Fast Response to Sophisticated Threats: OverWatch Incidents
Introduction Threat hunting leverages skilled defenders to hunt actively for the faintest signs of advanced attacks. OverWatch is CrowdStrike’s managed…
How Principal Writer Elly Searle Makes the Highly Technical Seem Completely Human
Elly Searle is a champion of user experience, a behind-the-scenes engineer, a client mentor and a technical translator. She is…
Duck Hunting with Falcon Complete: Analyzing a Fowl Banking Trojan, Part 1
Adversaries constantly develop new tactics that enhance their capabilities to deploy malware across networked environments and monetize infected systems. This…
Only the Transformational Will Survive
The title of this blog might seem harsh, but in today's world we are in uncharted territory and the cold…
Getting the Bacon from the Beacon
In recent months, CrowdStrike® Services has observed a continued increase in the use of Cobalt Strike by eCrime and nation-state…
Custom Dashboard Offers Greater Visibility for Zerologon Vulnerability
A serious and potentially dire patch warning has been issued by the Department of Homeland Security (DHS) advisory team, the…
Double Trouble: Ransomware with Data Leak Extortion, Part 1
The most prominent eCrime trend observed so far in 2020 is big game hunting (BGH) actors stealing and leaking victim…
CrowdStrike Plans to Advance Zero Trust Capabilities with Acquisition of Preempt Security
In 2020, we saw a rapid shift to digital transformation, accelerating the adoption of cloud technologies across industries. This secular…