Application Hygiene for a Remote Workforce
Introduction Many organizations around the globe are developing a “new normal” - striving to maintain the same productivity while utilizing…
CharCNNs and PowerShell Scripts: Yet Another Fight Against Malware
Malware in the Scripting Landscape Scripting is a well-known means of spreading malware. Easy to write and often difficult for…
Staying Off the Land: A Threat Actor Methodology
With offense-focused methodologies being created around “living off the land” and “bring your own land,” we would like to cover…
How to Install Falcon Sensor with Amazon WorkSpaces
Introduction In this article, we will show you how the Falcon sensor can be installed on Amazon WorkSpaces to deploy…
How to Integrate CrowdStrike with Zscaler Private Access
Introduction As enterprises move application and resources to the cloud, users are connecting to them remotely from coffee shops, airports,…
How to Integrate CrowdStrike with Zscaler Internet Access
Introduction Users and applications are moving to the cloud and putting a strain on legacy “castle-and-moat” network security. Legacy security…
CrowdStrike Falcon Dominance Evident in MITRE ATT&CK Evaluation With 100% Detection Across All 19 Attack Phases
This week marks the release of results from the second iteration of MITRE’s recurring ATT&CK Evaluation program, and I could…
Securing Mobile Devices for a Remote Workforce
Introduction Around the globe, IT teams are rapidly adapting to evolving security requirements. This includes transitioning employees to remote workers…
Exploiting GlobalProtect for Privilege Escalation, Part Two: Linux and macOS
This is the second blog in a two-part series covering the exploitation of the Palo Alto Networks GlobalProtect VPN client…