An In-Depth Analysis of Samsam Ransomware and BOSS SPIDER
Introduction This analysis provides an in-depth view of the Samsam ransomware, which is developed and operated by the actor tracked…
Meet CrowdStrike’s Adversary of the Month for May: MYTHIC LEOPARD
Community or industry names: Transparent Tribe and C-Major have been associated with this actor. The May 2018 adversary spotlight is…
Falcon Prevent Free Trial: Because Evaluating Next-Gen AV Solutions Should Be Fast and Easy
There is a sea change underway in the security industry. Organizations are moving away from legacy antivirus (AV) solutions because…
Building Cybersecurity from the Ground Up — Part 2: The Technology Basics
Part 1 of this series, “The Business Perspective,” examined how to build a cybersecurity capability from the ground up by…
CrowdStrike on Dark Reading: Why “Breakout Time” Is Critical to Your Security Strategy
A new article by CrowdStrike Director of Product Marketing Scott Taschler, published on Dark Reading, discusses how the key metric…
Building Cybersecurity from the Ground Up — Part 1: The Business Perspective
“Where should I invest in security if I’m starting from scratch?” That’s a question CrowdStrike Services clients frequently ask us.…
The 4 Myths Revealed in CrowdStrike’s Threat Hunting Workshop
For as long as we have had a cybersecurity industry, the market’s attention has been solidly focused on improvements in…
Australia Needs to do More on Data Protection
This article was originally published on The Australian Digital privacy is top of mind for many Australians. With weekly data…
Trying to Dance the Samba: An Exercise in Weaponizing Vulnerabilities
Introduction This blog tells the story of a failed Samba exploitation attempt. The goal was to assess what it would…
CrowdStrike CEO George Kurtz in Entrepreneur Magazine: What It Takes to Lead
A recent article in Entrepreneur Magazine titled, “I've Gone From Entrepreneur to the Corporate World and Back Again. This Is…