X

Our website uses cookies to enhance your browsing experience.

CONTINUE TO SITE >
Occupy Central: The Umbrella Revolution And Chinese Intelligence

Occupy Central: The Umbrella Revolution and Chinese Intelligence

First observed in late 2013, the People’s Republic of China (PRC) has steadily increased the use of its intelligence services…

READ MORE
Why Digital Crowbars Aren’t The Enemy

Why Digital Crowbars Aren’t the Enemy

At CrowdStrike, our approach to fighting cyber crime is fundamentally different from the one cybersecurity industry has taken over the…

READ MORE
CrowdStrike ShellShock Scanner – New Community Tool

CrowdStrike ShellShock Scanner – New Community Tool

A large number of ShellShock online vulnerability scanners have been released since the bug disclosure on September 24. These tools…

READ MORE
CrowdStrike Launches The Adversary Manifesto

CrowdStrike Launches The Adversary Manifesto

Welcome to the first edition of The Adversary Manifesto, a new publication focusing on the most important cyber security issues…

READ MORE
Registry Analysis With CrowdResponse

Registry Analysis with CrowdResponse

The third release of the free CrowdResponse incident response collection tool is now available!  This time around we include plugins that facilitate…

READ MORE
Deep In Thought: Chinese Targeting Of National Security Think Tanks

Deep in Thought: Chinese Targeting of National Security Think Tanks

For some time now, CrowdStrike has been working with a number of national security think tanks and human rights organizations…

READ MORE
Hat-tribution To PLA Unit 61486

Hat-tribution to PLA Unit 61486

Attribution is a key component of cyber-intelligence, by knowing the adversary you can effectively understand their intentions and objectives. Deep…

READ MORE
Gameover

Gameover

On Friday May 30, 2014, an unprecedented botnet disruption was initiated by the United States Department of Justice (DOJ) in…

READ MORE
Hunting Badness On OS X With CrowdStrike’s Falcon Real-Time Forensic Capabilities

Hunting Badness on OS X with CrowdStrike’s Falcon Real-Time Forensic Capabilities

In this blog post, we’ll take a look at an example of a typical targeted attack with OS X malware…

READ MORE
Business As Usual?

Business as Usual?

The rollercoaster ride that represents cyber negotiations between the U.S. and China reached both new heights and lows Monday as…

READ MORE
 

Try CrowdStrike Free for 15 Days Get Started with A Free Trial