New Chinese Leadership: How It Impacts Cyber Security

New Chinese Leadership: How it Impacts Cyber Security

The CrowdStrike Intelligence Team is excited to showcase some of the non-technical analysis that we conduct every day. This analysis…

READ MORE
HUNT Or BE HUNTED

HUNT or BE HUNTED

IDENTIFY: *NEW* Offerings from CrowdStrike Services  In my former life as Principal Cyber Security Systems Engineer for a DoD contractor,…

READ MORE
Unpacking Dynamically Allocated Code

Unpacking Dynamically Allocated Code

Background   Today, most malware is obfuscated to make it more difficult for traditional antivirus engines to detect the malicious…

READ MORE
FinSpy Mobile: IOS And Apple UDID Leak

FinSpy Mobile: iOS and Apple UDID leak

Last week, Morgan Marquis-Boire and Bill Marczak from The Citizen Lab published  a fascinating glance at real-world mobile espionage tool…

READ MORE
CrowdRE: Alpha++ Release

CrowdRE: Alpha++ Release

Since CrowdStrike released our free Crowdsourced Reverse Engineering (CrowdRE) service in June, the team has been hard at work building…

READ MORE
Upcoming Black Hat USA 2012: Android 4.0.1 Exploitation

Upcoming Black Hat USA 2012: Android 4.0.1 Exploitation

This February in the "Hacking Exposed: Mobile RATs" talk at the RSA conference, we released a demonstration of an end to end compromise…

READ MORE
Streamlining The Reverse Engineering Process With CrowdRE

Streamlining the Reverse Engineering Process with CrowdRE

Background As is commonly known in the industry, and as evident from recent high-profile malware samples such as Stuxnet and…

READ MORE
Join The Crowd!

Join the Crowd!

Reversing complex software quickly is challenging due to the lack of professional tools that support collaborative analysis. The CrowdRE project…

READ MORE
CrowdStrike Intelligence –  Adversary-based Approach

CrowdStrike Intelligence – Adversary-based Approach

Treating the problem, not the symptoms Having spent the better part of the last 10 years dealing with various cyber…

READ MORE
ARMv7/Thumb2 Inline Code Hooking

ARMv7/Thumb2 Inline Code Hooking

At Hackito Ergo Sum 2012, I presented about Exploitation of the RenderArena allocator in WebKit (PDF) with a focus on the…

READ MORE
 

Stop Breaches with CrowdStrike Falcon request a live demo