Lessons Learned From A Cautionary Tale Of Corporate Destruction

Lessons Learned from a Cautionary Tale of Corporate Destruction

Last year, the global IT security industry spent over $70 billion and produced over 80 categories of products to protect…

READ MORE
CrowdStrike’s 2014 Global Threat Intel Report: Know Your Adversary And Better Protect Your Network

CrowdStrike’s 2014 Global Threat Intel Report: Know Your Adversary and Better Protect Your Network

Every day cyber security teams vigilantly deploy tools, monitor networks to detect malware and protect them against adversaries. But, is…

READ MORE
How To Prepare For And Respond To Targeted Attacks

How to Prepare for and Respond to Targeted Attacks

Targeted attacks are inevitable in organizations with sensitive data. Depending on the situation, a targeted attack may involve the theft…

READ MORE
Q&A With Pete Murphy, Chief Information Officer At Cardinal Innovations Healthcare Solutions

Q&A with Pete Murphy, Chief Information Officer at Cardinal Innovations Healthcare Solutions

When it comes to industries at risk from cyber attack, the healthcare industry is rapidly rising to the top of…

READ MORE
Storm Chasing:  Hunting Hurricane Panda

Storm Chasing: Hunting Hurricane Panda

Hurricane Panda is a sophisticated adversary believed to be of Chinese origin and known to target infrastructure companies. Their RAT…

READ MORE
Adapting Cyber Security In A New Era Of Corporate Destruction

Adapting Cyber Security in a New Era of Corporate Destruction

Corporations suffered more cyber attacks in 2014 than ever before, causing the loss of business intelligence and personally identifiable information…

READ MORE
The Cardinal Rules Of Protecting Your Network

The Cardinal Rules of Protecting Your Network

It may be winter, but the adversaries definitely aren’t hibernating. They’re as busy as ever, and one of their hottest…

READ MORE
CrowdResponse Application Execution Modules Released

CrowdResponse Application Execution Modules Released

As the user base of CrowdResponse multiplies, we see a steady stream of requests from active users. Many use the…

READ MORE
Sheep Year Kernel Heap Fengshui: Spraying In The Big Kids’ Pool

Sheep Year Kernel Heap Fengshui: Spraying in the Big Kids’ Pool

The State of Kernel Exploitation The typical write-what-where kernel-mode exploit technique usually relies on either modifying some key kernel-mode data…

READ MORE
New Era Of Cyber Attacks – Know Thy Adversary

New Era of Cyber Attacks – Know Thy Adversary

In February 2014 at the RSA Conference, my colleague George Kurtz and I presented a session titled “Hacking Exposed: Day…

READ MORE
 

Stop Breaches with CrowdStrike Falcon request a live demo