Jackie Castelli
Credential Theft: An Adversary Favorite
Stealthy and Powerful CrowdStrike frequently observes adversaries using valid account credentials across the attack lifecycle. In fact, credential dumping, an illegal way to obtain account credentials[…]
Why Machine Learning Is a Critical Defense Against Malware
Dr. Sven Krasser, CrowdStrike® chief scientist, has called machine learning (ML) the first line of defense against modern threats. That statement, which he made a couple of years ago, is even truer to[…]
Do You Think SMBs Are Safe From Cyberattacks? Think Again
Media coverage of cybersecurity breaches would lead us to believe that sophisticated, targeted attacks are reserved for well-known enterprise organizations. Searching the Internet for data breaches of[…]
Should You Worry About Software Supply Chain Attacks?
While there is much discussion today about potential weaknesses in the hardware supply chain, given the recent attacks attributed to China, the software supply chain has already proven to be vulnerabl[…]
Is There Such a Thing as a Malicious PowerShell Command?
PowerShell is a scripting language originally designed to automate Windows administrative tasks. In addition to running its native commands, it can call DLL functions, access any .NET framework type o[…]
GDPR Enforcement is Right Around the Corner — Is Your Organization Prepared?
The impending enforcement of the General Data Protection Regulation (GDPR) on May 25, 2018 has many organizations scrambling to ensure compliance before the clock runs out. Since cybersecurity will be[…]
The 6 Requirements of True Next-Gen Endpoint Protection
If there’s one term that vendors love to attach to their security solutions, it’s “next-gen.” This is especially true for endpoint security products, which are routinely marketed as next-gen, or simpl[…]
Key Characteristics of Modern Fileless Attacks
One of the findings in the 2017 Verizon Data Breach Investigations Report (DBIR) is that only 51 percent of cyberattacks involve malware. The remaining 49 percent represent a major vulnerability conce[…]