X

Our website uses cookies to enhance your browsing experience.

CONTINUE TO SITE >
How To Integrate CrowdStrike With Zscaler Private Access

How to Integrate CrowdStrike with Zscaler Private Access

Introduction As enterprises move application and resources to the cloud, users are connecting to them remotely from coffee shops, airports,…

READ MORE
How To Integrate CrowdStrike With Zscaler Internet Access

How to Integrate CrowdStrike with Zscaler Internet Access

Introduction Users and applications are moving to the cloud and putting a strain on legacy “castle-and-moat” network security. Legacy security…

READ MORE
CrowdStrike Falcon Dominance Evident In MITRE ATT&CK Evaluation With 100% Detection Across All 19 Attack Phases

CrowdStrike Falcon Dominance Evident in MITRE ATT&CK Evaluation With 100% Detection Across All 19 Attack Phases

This week marks the release of results from the second iteration of MITRE’s recurring ATT&CK Evaluation program, and I could…

READ MORE
Securing Mobile Devices For A Remote Workforce

Securing Mobile Devices for a Remote Workforce

Introduction Around the globe, IT teams are rapidly adapting to evolving security requirements. This includes transitioning employees to remote workers…

READ MORE
Exploiting GlobalProtect For Privilege Escalation, Part Two: Linux And MacOS

Exploiting GlobalProtect for Privilege Escalation, Part Two: Linux and macOS

This is the second blog in a two-part series covering the exploitation of the Palo Alto Networks GlobalProtect VPN client…

READ MORE
Exploiting GlobalProtect For Privilege Escalation, Part One: Windows

Exploiting GlobalProtect for Privilege Escalation, Part One: Windows

The CrowdStrike® Intelligence Advanced Research Team discovered two distinct vulnerabilities in the Windows, Linux and macOS versions of the Palo…

READ MORE
Malspam In The Time Of COVID-19

Malspam in the Time of COVID-19

As the new coronavirus, COVID-19, spreads around the planet, many people are filled with emotions like fear, uncertainty and hope…

READ MORE
Online Learning: Staying Ahead Of Cyber Threats Anytime And Anywhere

Online Learning: Staying Ahead of Cyber Threats Anytime and Anywhere

While COVID-19 is requiring many people to remain at home, cyber threats are continuing — and even escalating as adversaries…

READ MORE
Vulnerability Patching For A Remote Workforce

Vulnerability Patching for a Remote Workforce

Introduction With your IT and security staff working remotely, accessing and controlling systems scattered across multiple locations – from the…

READ MORE
Targeted Dharma Ransomware Intrusions Exhibit Consistent Techniques

Targeted Dharma Ransomware Intrusions Exhibit Consistent Techniques

Since at least 2018, criminal actors have been conducting big game hunting (BGH) campaigns, deploying ransomware on a targeted scale…

READ MORE
 

Try CrowdStrike Free for 15 Days Get Started with A Free Trial