X

Our website uses cookies to enhance your browsing experience.

CONTINUE TO SITE >
Peer-to-Peer Poisoning Attack Against The Kelihos.C Botnet

Peer-to-Peer Poisoning Attack against the Kelihos.C Botnet

Almost one year ago, CrowdStrike and some partners conducted a takeover operation against the Kelihos.B botnet, a peer-to-peer network of…

READ MORE
Free Community Tool: CrowdInspect

Free Community Tool: CrowdInspect

CrowdInspect is a free community tool for Microsoft Windows systems from CrowdStrike aimed to help alert you to the presence…

READ MORE
CrowdStrike Falcon Unveiled: The Power Of The Platform

CrowdStrike Falcon Unveiled: The Power of The Platform

It’s been almost a year to the day since we announced the formation of CrowdStrike, a company totally focused on…

READ MORE
Empowering Information Sharing: Release Of PyNSSFClient

Empowering Information Sharing: Release of pyNSSFClient

Malware is one of the common tools used by adversaries, whether they're getting a foothold in your network, moving laterally…

READ MORE
I/O You Own: Windows 8 Update

I/O You Own: Windows 8 Update

At SyScan 2012 last year, I debuted research on how to bypass the Operating System’s normal input/output (I/O) disk driver…

READ MORE
HTTP Iframe Injecting Linux Rootkit

HTTP iframe Injecting Linux Rootkit

On Tuesday, November 13, 2012, a previously unknown Linux rootkit was posted to the Full Disclosure mailing list by an…

READ MORE
New Chinese Leadership: How It Impacts Cyber Security

New Chinese Leadership: How it Impacts Cyber Security

The CrowdStrike Intelligence Team is excited to showcase some of the non-technical analysis that we conduct every day. This analysis…

READ MORE
HUNT Or BE HUNTED

HUNT or BE HUNTED

IDENTIFY: *NEW* Offerings from CrowdStrike Services  In my former life as Principal Cyber Security Systems Engineer for a DoD contractor,…

READ MORE
Unpacking Dynamically Allocated Code

Unpacking Dynamically Allocated Code

Background   Today, most malware is obfuscated to make it more difficult for traditional antivirus engines to detect the malicious…

READ MORE
FinSpy Mobile: IOS And Apple UDID Leak

FinSpy Mobile: iOS and Apple UDID leak

Last week, Morgan Marquis-Boire and Bill Marczak from The Citizen Lab published  a fascinating glance at real-world mobile espionage tool…

READ MORE
 

Try CrowdStrike Free for 15 Days Get Started with A Free Trial