Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

February 2024

The Anatomy of an ALPHA SPIDER Ransomware Attack

Over the last two years, CrowdStrike Services has run several incident response (IR) engagements — in both pre- and post-ransomware situations — in which different ALPHA SPIDER affiliates demonstrated novel offensive techniques coupled with more commonly observed techniques. The events described in this blog have been attributed to ALPHA SPIDER affiliates by CrowdStrike Counter Adversary Operations.

CrowdStrike and Intel Research Collaborate to Advance Endpoint Security Through AI and NPU Acceleration

At CrowdStrike, we are relentlessly researching and developing new technologies to outpace new and sophisticated threats, track adversaries’ behavior and stop breaches. As today’s adversaries continue to become faster and more advanced, the speed of enterprise detection and response is paramount. It is also a challenge for today’s organizations, which face mounting attack volumes amid a global shortage of cybersecurity practitioners.

CrowdStrike Customers Share Benefits of Cybersecurity Consolidation and Technology Integrations

I recently had the opportunity to speak with three CrowdStrike customers who shared their stories on why they consolidated on the CrowdStrike Falcon® XDR platform and the benefits of CrowdStrike’s tech integrations with partners like Okta and Zscaler. The 30-minute virtual panel, “Customer Best Practices for Security Consolidation Success,” is brimming with helpful information for security professionals. Why is this topic top-of-mind for so many?

Still Alive: Updates for Well-Known Latin America eCrime Malware Identified in 2023

Latin America (LATAM) is a growing market, and threat actors have used numerous eCrime malware variants to target users in this region. Over the past few years, many researchers have characterized the tactics, techniques and procedures (TTPs) of widespread Latin America malware families, including but not limited to Mispadu, Grandoreiro, Mekotio, Casbaneiro, Metamorfo and Astaroth.

Conversations with Charlotte AI: Vulnerabilities on Internet-Facing Hosts

With Charlotte AI, the information security analysts need to stop breaches is simply a question away. Watch how analysts are turning hours of work into minutes and seconds — getting the context they need to identify vulnerabilities on internet-facing hosts.

CrowdStrike 2024 Global Threat Report: Adversaries Gain Speed and Stealth

The CrowdStrike Global Threat Report, now in its tenth iteration, examines how adversaries’ behavior poses an ever-expanding risk to the security of organizations’ data and infrastructure. Armed with this critical information, organizations are better equipped to face evolving threats. Stealth was the pervading theme of the 2023 threat landscape.

CrowdStrike Named the Only Customers' Choice: 2024 Gartner "Voice of the Customer" for Vulnerability Assessment

It is a common refrain in security circles that “nobody loves their vulnerability management tool.” CrowdStrike may have just proved to be the exception. We are proud to announce that CrowdStrike is the only vendor named a Customers’ Choice in the 2024 Gartner “Voice of the Customer” Report for Vulnerability Assessment. In this report, CrowdStrike is the only vendor placed in the upper right quadrant, meaning we received a Customers’ Choice Distinction.

Falcon Exposure Management Asset Criticality Rules: Demo Drill Down

Undifferentiated protection of assets can lead to misallocated resources and vulnerable critical systems. Falcon Exposure Management's Asset Criticality Rules feature allows for precise prioritization of your most essential assets, ensuring they receive the focused protection they deserve. This demo will showcase how effectively implemented criticality rules bring clarity and strategic security to safeguard your key assets where it matters most.

Seeing into the Shadows: Tackling ChromeOS Blind Spots with Dell and CrowdStrike

According to a 2023 Forbes article, 12.7% of U.S. workers work remotely and 28.2% have adopted a hybrid work schedule. As device and usage trends continue to shift, organizations must find ways to secure remote endpoints that could grant adversaries access if left vulnerable.

How to Secure Business-Critical Applications

As organizations move more of their business-critical applications to the cloud, adversaries are shifting their tactics accordingly. And within the cloud, it’s clear that cybercriminals are setting their sights on software applications: In fact, industry data shows 8 out of the top 10 breaches in 2023 were related to applications.

HijackLoader Expands Techniques to Improve Defense Evasion

CrowdStrike researchers have identified a HijackLoader (aka IDAT Loader) sample that employs sophisticated evasion techniques to enhance the complexity of the threat. HijackLoader, an increasingly popular tool among adversaries for deploying additional payloads and tooling, continues to evolve as its developers experiment and enhance its capabilities.

CrowdStrike Defends Against Azure Cross-Tenant Synchronization Attacks

As Microsoft Azure continues to gain market share in the cloud infrastructure space, it has garnered attention from adversaries ranging from hacktivist and eCrime threat actors to nation-state adversaries. Recent attacks on Microsoft by cloud-focused threat actors like COZY BEAR are becoming more frequent and garnering huge attention.

Architecture Drift: What It Is and How It Leads to Breaches

Cybercriminals work around the clock to discover new tactics to breach systems. Each time a digital ecosystem changes, it can introduce a weakness for a threat actor to quickly discover and exploit. As technological innovation progresses rapidly, and organizations expand their infrastructure, this weakness may take shape in the form of architecture drift. Today, we explore the concept of architecture drift: what it is, why it matters and how application security posture management (ASPM) can help.