More than just your eSignature
CrowdStrike recently conducted an investigation for a client operating in the healthcare sector that was subject to an ongoing phishing…
Next Gen Penetration Testing: An Adversarial Approach
In today’s dynamic security world, organizations must understand the benefits of proactively testing their cyber security posture to properly defend…
The Importance of Logs
Across all of the nation-state targeted attacks, insider thefts, and criminal enterprises that CrowdStrike has investigated, one thing is clear:…
Compromise Attack Targets: Corporate Printers?
The term, “Advanced persistent threat” (APT), has become almost as mainstream as security breaches in everyday news. With a multitude…
What Sets Falcon Apart: Intelligent Host Sensors
It can be difficult to distinguish between “next-generation” endpoint security solutions currently available. Usually the technology lags marketing by a…
New Protection Capability of Falcon for Mac: Improving Security With SUIDGuard
A comprehensive Next-Generation Endpoint Protection strategy shouldn’t just be about reacting and responding to threats, but also be complemented by…
“You Want Me to Do What?” A Guide to Interpreting Cybersecurity Recommendations
Congratulations! You’ve reached the end of yet another proactive engagement with a security services provider. Now that the engagement is…
Top 5 Cybersecurity Mistakes Companies Make and How to Avoid Them
Cybersecurity requires a holistic organizational approach. From the leadership to each rank-and-file employee, a concerted effort must be maintained to…
Nothing else is working. Why not memory forensics?
I ran across a couple of blog posts recently that were espousing the virtues of memory forensics. Having developed a…
Sakula Reloaded
Often during the investigation of sophisticated threat actors, the demarcation between the different attackers and campaigns are blurry. Researchers need…