X

Our website uses cookies to enhance your browsing experience.

CONTINUE TO SITE >
CrowdStrike CTO’s Senate Testimony On Countering Nation-State Cyberattacks – Part 1: Threat Hunting

CrowdStrike CTO’s Senate Testimony on Countering Nation-State Cyberattacks – Part 1: Threat Hunting

On November 14, I had the privilege of testifying before the Senate Armed Services Subcommittee on Cybersecurity. The official title…

READ MORE
CrowdStrike Receives Highest Overall Score In The 2018 Gartner Peer Insights Customers’ Choice For EPP

CrowdStrike Receives Highest Overall Score in the 2018 Gartner Peer Insights Customers’ Choice for EPP

We are excited about some fantastic recognition we received today, when CrowdStrike® was named in the 2018 Gartner Peer Insights…

READ MORE
Managed Threat Hunting Bridges The Talent Gap

Managed Threat Hunting Bridges the Talent Gap

This article was first published on November 4, 2018 in The Security Ledger and is republished with permission. Skilled operators…

READ MORE
Big Game Hunting: The Evolution Of INDRIK SPIDER From Dridex Wire Fraud To BitPaymer Targeted Ransomware

Big Game Hunting: The Evolution of INDRIK SPIDER From Dridex Wire Fraud to BitPaymer Targeted Ransomware

INDRIK SPIDER is a sophisticated eCrime group that has been operating Dridex since June 2014. In 2015 and 2016, Dridex…

READ MORE
CrowdStrike Provides Free Dashboard To Identify Vulnerable Macs

CrowdStrike Provides Free Dashboard to Identify Vulnerable Macs

Image above is a screenshot of the CrowdStrike CVE-2018-4407 dashboard for macOS (click for larger image) The recent discovery of the…

READ MORE
Managed Threat Hunting Meets The Challenge Of The Tenacious Adversary

Managed Threat Hunting Meets the Challenge of the Tenacious Adversary

Dealing with an active, dedicated adversary during an incident is very different than what many consider the more “traditional” incident…

READ MORE
OverWatch Insights: Reviewing A New Intrusion Targeting Mac Systems

OverWatch Insights: Reviewing a New Intrusion Targeting Mac Systems

Mac enterprise networks are not as common as Windows environments. As a result, detailed information about targeted adversary intrusions against…

READ MORE
The Critical Role Of The “Human Detection Engine” In Cybersecurity

The Critical Role of the “Human Detection Engine” in Cybersecurity

Jennifer Ayers, CrowdStrike® VP of Falcon® OverWatch™ and Security Response, recently sat down with ISMG to discuss the importance of…

READ MORE
Meet CrowdStrike’s Adversary Of The Month For October: DUNGEON SPIDER

Meet CrowdStrike’s Adversary of the Month for October: DUNGEON SPIDER

DUNGEON SPIDER is a criminal group operating the ransomware most commonly known as Locky, which has been active since February…

READ MORE
Cutwail Spam Campaign Uses Steganography To Distribute URLZone

Cutwail Spam Campaign Uses Steganography to Distribute URLZone

CrowdStrike® Falcon® Intelligence™ has observed a new Cutwail spam campaign from NARWHAL SPIDER on 24 October 2018. NARWHAL SPIDER is…

READ MORE
 

Try CrowdStrike Free for 15 Days Get Started with A Free Trial