Mac Attacks Along the Kill Chain: Credential Theft [VIDEO]
This blog is the third in a series from CrowdStrike’s RSA 2019 keynote, “Hacking Exposed: Hacking Macs,” where I…
On-Demand Webcast Discusses “Making 60-Minute Remediation a Reality”
A new on-demand webcast features CrowdStrike Vice President of Managed Services Austin Murphy, and Sr. Product Director Con Mallon as…
Mac Attacks Along the Kill Chain: Part 2 — Privilege Escalation [VIDEO]
This blog is the second in a series from CrowdStrike’s RSA 2019 keynote, “Hacking Exposed: Hacking Macs,” where I…
Mimikatz in the Wild: Bypassing Signature-Based Detections Using the “AK47 of Cyber”
This blog shares information on some examples of how the CrowdStrike® Falcon® OverWatch™ team has observed the open-source tool known…
Mac Attacks Along the Kill Chain: Part 1 — Delivery Using URL Schemes [VIDEO]
As a senior research developer with the Falcon OverWatch managed hunting team, I joined CrowdStrike co-founders, CEO George Kurtz and…
Key Trends From the CrowdStrike 2019 Global Threat Report
Update: CrowdStrike's 2020 Global Threat Report is now available. Download the report to stay ahead of today's adversaries. The CrowdStrike®…
ADP Trusts CrowdStrike Falcon to Protect Payrolls and Workers Around the World
In this blog, former ADP Staff Vice President and Chief Security Officer Roland Cloutier discusses why ADP chose the CrowdStrike…
How to Use Falcon Indicator Graph
Introduction In this article and video, we will see how the Indicator Graph provides us a visual representation of how…