Mac Attacks Along The Kill Chain: Part 2 — Privilege Escalation [VIDEO]

Mac Attacks Along the Kill Chain: Part 2 — Privilege Escalation [VIDEO]

  This blog is the second in a series from CrowdStrike’s RSA 2019 keynote, “Hacking Exposed: Hacking Macs,” where I…

READ MORE
Introduction To Falcon MalQuery (Malware Search Engine)

Introduction to Falcon MalQuery (Malware Search Engine)

Broader Picture Gathering and using threat intelligence is a core capability in cyber security that most organizations are still learning.…

READ MORE
Mimikatz In The Wild: Bypassing Signature-Based Detections Using The “AK47 Of Cyber”

Mimikatz in the Wild: Bypassing Signature-Based Detections Using the “AK47 of Cyber”

This blog shares information on some examples of how the CrowdStrike® Falcon® OverWatch™ team has observed the open-source tool known…

READ MORE
Mac Attacks Along The Kill Chain: Part 1 — Delivery Using URL Schemes [VIDEO]

Mac Attacks Along the Kill Chain: Part 1 — Delivery Using URL Schemes [VIDEO]

As a senior research developer with the Falcon OverWatch managed hunting team, I joined CrowdStrike co-founders, CEO George Kurtz and…

READ MORE
Key Trends From The CrowdStrike 2019 Global Threat Report

Key Trends From the CrowdStrike 2019 Global Threat Report

The CrowdStrike® 2019 Global Threat Report: “Adversary Tradecraft and the Importance of Speed,” includes the combined work of CrowdStrike’s skilled…

READ MORE
ADP Trusts CrowdStrike Falcon To Protect Payrolls And Workers Around The World [VIDEO]

ADP Trusts CrowdStrike Falcon to Protect Payrolls and Workers Around the World [VIDEO]

In this video, ADP Staff Vice President and Chief Security Officer Roland Cloutier explains why ADP chose the CrowdStrike Falcon…

READ MORE
How To Use Falcon Indicator Graph

How to Use Falcon Indicator Graph

Introduction In this article and video, we will see how the Indicator Graph provides us a visual representation of how…

READ MORE
How To Manage USB Devices

How to Manage USB Devices

Introduction This document will outline how to use Falcon Device Control to create and enforce USB device policy in your…

READ MORE
Interception: Dissecting BokBot’s “Man In The Browser”

Interception: Dissecting BokBot’s “Man in the Browser”

BokBot: Proxy Module This article is a continuation of CrowdStrike’s recent blog, “Digging Into BokBot’s Core Module,” and provides a…

READ MORE
New Evidence Proves Ongoing WIZARD SPIDER / LUNAR SPIDER Collaboration

New Evidence Proves Ongoing WIZARD SPIDER / LUNAR SPIDER Collaboration

On March 17, 2019, CrowdStrike® Intelligence observed the use of a new BokBot (developed and operated by LUNAR SPIDER) proxy…

READ MORE
 

Try CrowdStrike Free for 15 Days Get Started with A Free Trial