Hidden Administrative Accounts: BloodHound to the Rescue
Defending an organization from today’s sophisticated attacks is no easy task. It often requires security teams to be ready at…
Operators of SamSam Continue to Receive Significant Ransom Payments
On March 22, the city of Atlanta, Georgia, was crippled by a ransomware attack that has since been identified as…
A Hunter’s Perspective: Detecting Formbook 3.8 Activity in Your Environment
Formbook is a tool that has been available for purchase from criminal forums for several years — it’s used to…
Meet CrowdStrike’s Adversary of the Month for April: STARDUST CHOLLIMA
STARDUST CHOLLIMA is a targeted intrusion adversary with a likely nexus to the Democratic People’s Republic of Korea (DPRK). This…
CrowdStrike Exemplifies the RSA 2018 Theme: “Now Matters”
Another year has rushed by and even though RSA moved to April, it hardly seems possible it will be here…
Securing Your Business With the Cloud: The Sky’s the Limit
Note: Guest blogger Erik Hart is the CISO and director of IT risk management at Zebra Technologies Corp., but the views…
Why North Korean Cyberwarfare is Likely to Intensify
Despite a parade of issues battling for headlines today, the impending negotiations between the United States and the Democratic People's…
GDPR Enforcement is Right Around the Corner — Is Your Organization Prepared?
The impending enforcement of the General Data Protection Regulation (GDPR) on May 25, 2018 has many organizations scrambling to ensure…