X

Our website uses cookies to enhance your browsing experience.

CONTINUE TO SITE >
The Adversary Manifesto:  A Q&A With CrowdStrike’s VP Of Threat Intelligence

The Adversary Manifesto: A Q&A with CrowdStrike’s VP of Threat Intelligence

Adam Meyers runs CrowdStrike's Global Threat Intelligence team and is responsible for creating actionable intelligence that enables customers to understand the who,…

READ MORE
CrowdStrike Discovers Use Of 64-bit Zero-Day Privilege Escalation Exploit (CVE-2014-4113) By Hurricane Panda

CrowdStrike Discovers Use of 64-bit Zero-Day Privilege Escalation Exploit (CVE-2014-4113) by Hurricane Panda

Every once in a while an adversary does something unique or interesting that really captures our attention. The majority of…

READ MORE
Mitigating Bash ShellShock

Mitigating Bash ShellShock

Following the frenzy of patch releases in reaction to the CVE-2014-6271 Bash Vulnerability (ShellShock), several blogs and articles were published…

READ MORE
Occupy Central: The Umbrella Revolution And Chinese Intelligence

Occupy Central: The Umbrella Revolution and Chinese Intelligence

First observed in late 2013, the People’s Republic of China (PRC) has steadily increased the use of its intelligence services…

READ MORE
CrowdStrike ShellShock Scanner – New Community Tool

CrowdStrike ShellShock Scanner – New Community Tool

A large number of ShellShock online vulnerability scanners have been released since the bug disclosure on September 24. These tools…

READ MORE
Registry Analysis With CrowdResponse

Registry Analysis with CrowdResponse

The third release of the free CrowdResponse incident response collection tool is now available!  This time around we include plugins that facilitate…

READ MORE
Deep In Thought: Chinese Targeting Of National Security Think Tanks

Deep in Thought: Chinese Targeting of National Security Think Tanks

For some time now, CrowdStrike has been working with a number of national security think tanks and human rights organizations…

READ MORE
Hat-tribution To PLA Unit 61486

Hat-tribution to PLA Unit 61486

Attribution is a key component of cyber-intelligence, by knowing the adversary you can effectively understand their intentions and objectives. Deep…

READ MORE
Gameover

Gameover

On Friday May 30, 2014, an unprecedented botnet disruption was initiated by the United States Department of Justice (DOJ) in…

READ MORE
Hunting Badness On OS X With CrowdStrike’s Falcon Real-Time Forensic Capabilities

Hunting Badness on OS X with CrowdStrike’s Falcon Real-Time Forensic Capabilities

In this blog post, we’ll take a look at an example of a typical targeted attack with OS X malware…

READ MORE
 

Try CrowdStrike Free for 15 Days Get Started with A Free Trial