Adam Meyers
CrowdStrike and Microsoft Unite to Harmonize Cyber Threat Attribution
In cybersecurity, understanding an adversary’s identity, capabilities, and intent is critical to intelligent cyber defense. Attribution matters. Despite cyber threat intelligence tracking a multitude […]
CrowdStrike 2025 Global Threat Report: Beware the Enterprising Adversary
Today’s adversaries have long been accelerating and evolving their operations. Now they are developing a business-like structure, refining and scaling their successful strategies, and exploring new te[…]
Tech Analysis: Addressing Claims About Falcon Sensor Vulnerability
CrowdStrike is aware of inaccurate reporting and false claims about the security of the Falcon sensor. This blog sets the record straight by providing customers with accurate technical information abo[…]
CrowdStrike 2024 Global Threat Report: Adversaries Gain Speed and Stealth
The CrowdStrike Global Threat Report, now in its tenth iteration, examines how adversaries’ behavior poses an ever-expanding risk to the security of organizations’ data and infrastructure. Armed with […]
Explore the Adversary Universe
Since the beginning of CrowdStrike’s history, we have relentlessly pursued cyber adversaries across the internet, because we knew back when we started the company as we do now, it doesn’t matter wheth[…]
Situational Awareness: Cyber Threats Heightened by COVID-19 and How to Protect Against Them
Please Note: Check this blog for frequent updates on adversary activity related to COVID-19. June 24, 2020: Observed Activity Update As the COVID-19 pandemic continues to take hold in various geograph[…]
Meet CrowdStrike’s Adversary of the Month for June: MUSTANG PANDA
The June 2018 adversary spotlight is on MUSTANG PANDA, a China-based adversary that has demonstrated an ability to rapidly assimilate new tools and tactics into its operations, as evidenced by its use[…]