Falcon Intelligence Report: Wanna Ransomware Spreads Rapidly; CrowdStrike Falcon Prevents The Attack

Falcon Intelligence Report: Wanna Ransomware Spreads Rapidly; CrowdStrike Falcon Prevents the Attack

Wanna Decryption Ransom Screen Wanna (also known as WannaCry, WCry, WanaCrypt and WanaCrypt0r) ransomware exploded onto the ransomware scene on…

READ MORE
CrowdStrike Falcon Prevents WannaCry Ransomware

CrowdStrike Falcon Prevents WannaCry Ransomware

Blog updated: May 14th  In this screenshot example from the Falcon UI, the detection process tree shows that the malicious…

READ MORE
How To Install Falcon Antivirus (AV) On The Mac Platform

How to Install Falcon Antivirus (AV) on the Mac Platform

Introduction This video illustrates Falcon's ability to protect against multiple threats on the Mac with low impact. Video Read Video Transcript…

READ MORE
How To Detect And Prevent Fileless Webshell Attacks With Falcon

How to Detect and Prevent Fileless Webshell Attacks with Falcon

Introduction This video illustrates Falcon's ability to detect fileless webshell attacks, or attacks that don't rely on malware, instead relying…

READ MORE
Why Dwell Time Continues To Plague Organizations

Why Dwell Time Continues to Plague Organizations

Global statistics in the most recent Ponemon report on the cost of a data breach show dwell time for malicious…

READ MORE
Important Trends From The 2017 Verizon Breach Report

Important Trends From the 2017 Verizon Breach Report

The 2017 Verizon Data Breach Investigations Report (DBIR) marks the 10th year this prestigious report has been published and as…

READ MORE
A Primer On Machine Learning In Endpoint Security

A Primer on Machine Learning in Endpoint Security

Although machine learning (ML)  isn’t a new concept —  it actually dates back to the origins of the computer itself…

READ MORE
What Causes IT Alert Fatigue And How To Avoid It

What Causes IT Alert Fatigue and How to Avoid It

A recent survey by the Cloud Security Alliance found, among other things, that out of a sampling of 2,542 anomalous…

READ MORE
Inside The Takedown Of ZOMBIE SPIDER And The Kelihos Botnet

Inside the Takedown of ZOMBIE SPIDER and the Kelihos Botnet

This figure shows a snapshot of systems infected with Kelihos communicating with the sinkhole created to disable it. The arrest…

READ MORE
Securing The Mac-Based Organization

Securing the Mac-Based Organization

Though PCs still dominate the workplace, Macs continue to gain ground as the platform of choice for many organizations. As…

READ MORE
 

Try CrowdStrike Free for 15 Days Get Started with A Free Trial