Recent Blogs
Anthropic Claude Mythos Preview: The More Capable AI Becomes, the More Security It Needs
The Claude Mythos Preview matters for every enterprise. Frontier models raise the ceiling for both offense and defense. Our job is to make sure defenders hold the advantage. That is what we have alway[…]
How CrowdStrike is Accelerating Exposure Evaluation as Adversaries Gain Speed
When a new vulnerability is disclosed, security leaders want to know whether they’re exposed. In many organizations, the answer still depends on scan cycles that lag behind exposure — an architectural[…]
STARDUST CHOLLIMA Likely Compromises Axios npm Package
On March 31, 2026, a threat actor used stolen maintainer credentials to compromise the widely used HTTP client library Axios Node Package Manager (npm) package and deploy platform-specific ZshBucket v[…]
Falcon for IT Supports Windows Secure Boot Certificate Lifecycle Management
Microsoft has announced the retirement of the Windows UEFI CA 2011 certificate and the transition to the Windows UEFI CA 2023 certificate, with hard enforcement beginning in 2026. This update is part […]
Detecting CVE-2026-20929: Kerberos Authentication Relay via CNAME Abuse
CVE-2026-20929, a vulnerability with a CVSS of 7.5 that was patched in the January 2026 Patch Tuesday update, enables attackers to exploit Kerberos authentication relay through DNS CNAME record abuse.[…]
How Charlotte AI AgentWorks Fuels Security's Agentic Ecosystem
The era of human-speed defense is over. With eCrime breakout times collapsing to as fast as 27 seconds and attacks from AI-powered adversaries increasing 89% year-over-year, the traditional SOC has re[…]
CrowdStrike Flex for Services Expands Access to Elite Security Expertise
CrowdStrike is extending the Falcon Flex model to our services offering to provide organizations with the flexibility and speed required to prepare for modern threats, as well as the Zero Dollar Flex […]
Falcon Data Security Secures Data Wherever It Lives and Moves
In modern organizations, sensitive data lives everywhere and is constantly moving. It is created, accessed, transformed, and shared across endpoints, browsers, SaaS applications, cloud services, GenAI[…]
CrowdStrike Advances CNAPP with Industry-First Adversary-Informed Risk Prioritization
Interest in cloud-native application protection platforms (CNAPPs) has exploded over the recent years, partly due to their ability to reduce alert noise by translating siloed misconfigurations into co[…]
CrowdStrike Services and Agentic MDR Put the Agentic SOC in Reach
Today’s adversaries move at machine speed, operating across endpoint, identity, cloud, and third-party systems while weaponizing AI to evade detection. Fastest breakout times are measured in seconds, […]