CrowdResponse Application Execution Modules Released

CrowdResponse Application Execution Modules Released

As the user base of CrowdResponse multiplies, we see a steady stream of requests from active users. Many use the…

READ MORE
Sheep Year Kernel Heap Fengshui: Spraying In The Big Kids’ Pool

Sheep Year Kernel Heap Fengshui: Spraying in the Big Kids’ Pool

The State of Kernel Exploitation The typical write-what-where kernel-mode exploit technique usually relies on either modifying some key kernel-mode data…

READ MORE
New Era Of Cyber Attacks – Know Thy Adversary

New Era of Cyber Attacks – Know Thy Adversary

In February 2014 at the RSA Conference, my colleague George Kurtz and I presented a session titled “Hacking Exposed: Day…

READ MORE
Maximizing Network Threat Intel With Bro

Maximizing Network Threat Intel with Bro

There are multiple ways to use threat intelligence to monitor networks for suspicious activity -- our Falcon Host platform does…

READ MORE
Unprecedented Announcement By FBI Implicates North Korea In Destructive Attacks

Unprecedented Announcement by FBI Implicates North Korea in Destructive Attacks

There is a curse that is purported to translate to an old Chinese Proverb - “May you live in interesting…

READ MORE
The Battle For Safe Networks Could End With Open Sharing Of Information

The Battle for Safe Networks Could End with Open Sharing of Information

In our last post, Shawn Henry, president of CrowdStrike Services and sought-after cybersecurity expert, talked with us about cybersecurity trends…

READ MORE
Advanced Falconry: Seeking Out The Prey With Machine Learning

Advanced Falconry: Seeking out the Prey with Machine Learning

Interest in Machine Learning is on the rise. This was also evidenced by the attendance of our recent CrowdCast on…

READ MORE
Moving Cybersecurity From Reactive To Proactive With Shawn Henry

Moving Cybersecurity from Reactive to Proactive with Shawn Henry

We recently spoke with cybersecurity expert Shawn Henry, president of CrowdStrike Services and former Executive Assistant Director of the Federal…

READ MORE
Indicators Of Attack Vs. Indicators Of Compromise

Indicators of Attack vs. Indicators of Compromise

What is an Indicator of Attack (IOA) and why is it necessary to take an IOA-based detection and prevention approach…

READ MORE
Rockin’ Around Your Unsecured Network

Rockin’ Around Your Unsecured Network

It’s the most wonderful time of the year…until your network gets compromised. We’ve had a busy year here at CrowdStrike…

READ MORE
 

Stop Breaches with CrowdStrike Falcon request a live demo