Recent Blogs
Indirect Prompt Injection Attacks: A Lurking Risk to AI Systems
The rapid adoption of AI has introduced a new, semantic attack vector that many organizations are ill-prepared to defend against: prompt injection. While many security teams understand the threat of d[…]
Unveiling WARP PANDA: A New Sophisticated China-Nexus Adversary
Throughout 2025, CrowdStrike has identified multiple intrusions targeting VMware vCenter environments at U.S.-based entities, in which newly identified China-nexus adversary WARP PANDA deployed BRICKS[…]
CrowdStrike Leverages NVIDIA Nemotron in Amazon Bedrock to Advance Agentic Security
Adversaries are increasingly adopting AI technology to make their cyber operations faster, more efficient, and harder to detect. To stay ahead, defenders need intelligent systems capable of reasoning […]
Transform AWS Security Operations with Falcon Next-Gen SIEM
CrowdStrike is redefining how SOC teams turn cloud data into actionable intelligence by unifying speed, scale, and cost efficiency in one platform built for the cloud and AI era. Together with AWS, to[…]
CrowdStrike Unveils Real-Time Cloud Detection and Response Innovations
CrowdStrike is announcing new cloud detection and response (CDR) capabilities to help SOC teams reduce mean time to respond (MTTR) and strengthen protection across hybrid and multi-cloud environments.[…]
CrowdStrike Research: Security Flaws in DeepSeek-Generated Code Linked to Political Triggers
In January 2025, China-based AI startup DeepSeek (深度求索) released DeepSeek-R1, a high-quality large language model (LLM) that allegedly cost much less to develop and operate than Western competitors’ a[…]
Falcon Data Protection for Cloud Extends DSPM into Runtime
In a cloud-first world, sensitive data moves quickly between microservices, APIs, SaaS applications, and storage services. CrowdStrike Falcon® Data Protection for Cloud, now generally available, deliv[…]
Defeating BLOCKADE SPIDER: How CrowdStrike Stops Cross-Domain Attacks
Cross-domain attacks exemplify adversaries’ drive for speed and stealth. In these attacks, threat actors navigate multiple domains such as endpoint, cloud, and identity systems to maximize their reach[…]
To Stop AI-Powered Adversaries, Defenders Must Fight Fire with Fire
Anthropic's Threat Intelligence team recently uncovered and disrupted a sophisticated nation-state operation that weaponized Claude’s agentic capabilities and the Model Context Protocol (MCP) to orche[…]
From Vulnerability Management to Exposure Management: The Platform Era Has Arrived
AI has collapsed the vulnerability exploit lifecycle. Adversaries now discover, weaponize, and exploit exposures across hybrid environments in minutes — chaining together misconfigurations, unpatched […]