Recent Blogs
Q&A: How Mastronardi Produce Secures Innovation with CrowdStrike
Mastronardi Produce, North America’s largest greenhouse produce distributor, has been at the forefront of sustainable agriculture for over 70 years. In that time, being a leader in both agriculture an[…]
CrowdStrike Leads Agentic AI Innovation in Cybersecurity with Charlotte AI Detection Triage
AI has become both a powerful ally and a formidable weapon in today’s cybersecurity landscape. While AI enables security teams to detect and neutralize threats with unmatched speed and precision, adve[…]
Detect Data Exfiltration Techniques with Falcon Next-Gen SIEM
Sensitive data theft is among adversaries’ most common goals. For defenders, data exfiltration can lead to the compromise of customer data, public exposure of trade secrets, and potentially permanent […]
Naming Names: How Adversary Taxonomies Strengthen Global Security
Last month, during testimony on global cyber threats before the U.S. Committee on Homeland Security, a longstanding debate resurfaced: Why do vendors name different cyber threat actors, and can’t we d[…]
February 2025 Patch Tuesday: Four Zero-Days and Three Critical Vulnerabilities Among 67 CVEs
Microsoft has released security updates for 67 vulnerabilities in its February 2025 Patch Tuesday rollout. Among these are three Critical vulnerabilities and four zero-days affecting the Windows NTLMv[…]
CrowdStrike University Fast Track Fuels Cybersecurity Training
Organizations today battle an ever-evolving cyber threat landscape, yet many security teams struggle to keep pace due to a critical skills gap and limited access to high-quality training. As teams are[…]
Improving Kubernetes Security: Lessons from an Istio Configuration Finding
As a part of our ongoing work to secure cloud computing infrastructure, we delved into the inner workings of some popular Kubernetes add-ons. Our first subject of research was Istio, a popular service[…]
Caught in the Act: CrowdStrike’s New ML-Powered LDAP Reconnaissance Detections
Early in the cyberattack kill chain, reconnaissance enables attackers to assemble critical network information to plan a tailored attack strategy. In this phase, adversaries aim to map out networks an[…]
University of Sunderland Goes from Ransomware Recovery to Proactive Defense with CrowdStrike
In 2021, the University of Sunderland experienced a devastating ransomware attack that disrupted its services and highlighted vulnerabilities in its security posture. With over 28,000 students relying[…]
The Evolving Role of AI in Data Protection
Each year, Data Protection Day marks an opportunity to assess the state of privacy and security in the midst of technological innovation. This year’s inflection point follows a robust dialogue on AI f[…]