Recent Blogs
CrowdStrike Researchers Investigate the Threat of Patchless AMSI Bypass Attacks
Adversaries have employed various tactics to bypass Windows’ AMSI security feature, but such attacks are noisy, meaning they can be detected by monitoring security products A CrowdStrike Red Team Engi[…]
Stopping Cloud Breaches at Machine Speed: How CrowdStrike Uses Agentic AI to Power Cloud Detection and Response
Cloud is the new battleground, and more adversaries are joining the fight: New and unattributed cloud intrusions were up 26% in 2024, according to the CrowdStrike 2025 Global Threat Report. As adversa[…]
Exposing the Blind Spots: CrowdStrike Research on Feedback-Guided Fuzzing for Comprehensive LLM Testing
June 11, 2025
| Paul-Danut Urian - Mihai-Adrian Tecliceanu - Mihai Maganu - Alexandru Ghita | AI & Machine LearningCrowdStrike researchers have created a proof-of-concept framework that uses dynamic feedback-guided fuzzing to identify large language model (LLM) vulnerabilities Traditional template-based testing st[…]
June 2025 Patch Tuesday: One Zero-Day and Nine Critical Vulnerabilities Among 66 CVEs
Microsoft has addressed 66 vulnerabilities in its June 2025 security update release. This month's patches include fixes for one actively exploited zero-day vulnerability and nine Critical vulnerabilit[…]
How Falcon Next-Gen SIEM Protects Enterprises from VMware vCenter Attacks
Internet-facing assets are targeted for many reasons, such as to establish persistence, evade defensive capabilities, and access sensitive networks. According to the search engine Shodan, approximatel[…]
CrowdStrike Named a Customers’ Choice in 2025 Gartner® Peer Insights™ Voice of the Customer for User Authentication Report
CrowdStrike has been named a Customers’ Choice in the 2025 Gartner Peer Insights™ “Voice of the Customer for User Authentication” report. We have the most five-star ratings of any vendor evaluated in […]
Falcon Identity Protection Innovations Stop Insider Risk, Secure Non-Human Identities, and Lock Down Privileged Access
How do you stop identity-based attacks in real time — across both human and non-human identities? CrowdStrike Falcon® Identity Protection now delivers powerful new capabilities to answer that question[…]
CrowdStrike and Microsoft Unite to Harmonize Cyber Threat Attribution
In cybersecurity, understanding an adversary’s identity, capabilities, and intent is critical to intelligent cyber defense. Attribution matters. Despite cyber threat intelligence tracking a multitude […]
CrowdStrike Named a Frost Radar™ Leader in Cloud and Application Runtime Security
CrowdStrike has been named an innovation and growth Leader in the inaugural 2025 Frost Radar™: Cloud and Application Runtime Security (CARS), positioned highest on the Innovation Index among all vendo[…]
CrowdStrike Elevates XIoT Security with AI-Powered Insights
As organizations increasingly rely on connected devices to drive efficiency and innovation, the Extended Internet of Things (XIoT) — covering industrial control systems (ICS), operational technology ([…]