Peering Around The Corner

Peering Around the Corner

After the better part of a decade chasing adversaries around the Internet, there are a few things I know to…

READ MORE
Malware-Free Intrusions: Adversary Tricks And CrowdStrike Treats

Malware-Free Intrusions: Adversary Tricks and CrowdStrike Treats

‘Tis the season for trick-or-treating, so I thought it might be a good time to share some of the new…

READ MORE
CVE-2014-1761 – The Alley Of Compromise

CVE-2014-1761 – The Alley of Compromise

A significant fraction of targeted attacks involve spear phishing emails with malicious lure documents that, when opened, exploit a vulnerability…

READ MORE
#NCSAM Wrap Up: What’s Happening In Cyber Now?

#NCSAM Wrap Up: What’s Happening in Cyber Now?

National Cyber Security Awareness Month (NCSAM) is drawing to a close, but it’s been nice seeing so much coverage of…

READ MORE
How Public-Private Partnerships Can Best Secure Our Nation’s Critical Infrastructure

How Public-Private Partnerships Can Best Secure our Nation’s Critical Infrastructure

This month on The Adversary Manifesto we’ve been talking a lot about National Cyber Security Awareness Month (NCSAM). While for…

READ MORE
GoTel: Who Monitors The Monitors?

GoTel: Who Monitors the Monitors?

CrowdStrike Cloud Engineering is releasing GoTel which is an internal monitoring service that aims to ensure scheduled jobs, cronjobs, batch…

READ MORE
How Cybercrime And Cybersecurity Affects Nations And Geopolitics

How cybercrime and cybersecurity affects nations and geopolitics

The Adversary Manifesto recently spoke with Shawn Henry, President of CrowdStrike Services about geopolitics and cybersecurity. Henry is a sought-after…

READ MORE
The Adversary Manifesto:  A Q&A With CrowdStrike’s VP Of Threat Intelligence

The Adversary Manifesto: A Q&A with CrowdStrike’s VP of Threat Intelligence

Adam Meyers runs CrowdStrike's Global Threat Intelligence team and is responsible for creating actionable intelligence that enables customers to understand the who,…

READ MORE
CrowdStrike Discovers Use Of 64-bit Zero-Day Privilege Escalation Exploit (CVE-2014-4113) By Hurricane Panda

CrowdStrike Discovers Use of 64-bit Zero-Day Privilege Escalation Exploit (CVE-2014-4113) by Hurricane Panda

Every once in a while an adversary does something unique or interesting that really captures our attention. The majority of…

READ MORE
Go Ahead Connect To That Wireless Network, Nothing To Fear Here?

Go Ahead Connect to that Wireless Network, Nothing to Fear Here?

National Cyber Security Awareness Month often makes me feel nostalgic.  Ah, the old days!  Do you remember the halcyon days…

READ MORE
 

Stop Breaches with CrowdStrike Falcon request a live demo