Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

February 2025

CrowdStrike Named a Leader in The Forrester Wave: Managed Detection and Response Services Q1 2025

CrowdStrike has been named a Leader in The Forrester Wave: Managed Detection and Response (MDR) Services, Q1 2025. Forrester researched, analyzed, and scored the ten most significant vendors in the MDR market. CrowdStrike was named a Leader and ranked highest of any vendor evaluated in the Strategy category.

CrowdStrike 2025 Global Threat Report: Beware the Enterprising Adversary

Today’s adversaries have long been accelerating and evolving their operations. Now they are developing a business-like structure, refining and scaling their successful strategies, and exploring new technologies to cultivate a more efficient approach to cyberattacks. 2024 was the year of the enterprising adversary. The CrowdStrike Global Threat Report delivers critical insights into the evolving threat landscape and adversary behavior and tradecraft.

CrowdStrike Extends Real-Time Protection for Microsoft Entra ID to Take on Identity-Based Attacks

CrowdStrike is excited to announce the general availability of CrowdStrike Falcon Identity Protection for Microsoft Entra ID, unifying prevention, detection and response to identity-based attacks across hybrid environments. This builds on our existing protection for leading cloud-based identity providers, on-premises Active Directory, and SaaS applications.

Falcon Identity Protection Real-Time Entra ID Login Protection

Watch to see how CrowdStrike Falcon Identity Protection stops the compromise of Entra ID accounts by enabling you to leverage the Falcon platform’s context within the authentication flow through risk-based conditional access. Stop identity-based attacks in real time with the industry’s only unified platform for endpoint security and identity protection.

CrowdStrike Falcon Cloud Security Expands Support to Oracle Cloud Infrastructure

CrowdStrike is thrilled to announce a collaboration with Oracle that will bring the unified, AI-powered protection of CrowdStrike Falcon Cloud Security support to Oracle Cloud Infrastructure (OCI). As OCI has become a strategic choice for organizations seeking enterprise-grade performance and security, this expansion improves the visibility and protection to defend against cloud-focused threats.

CrowdStrike and Intel Partner with MITRE Center for Threat-Informed Defense in PC Hardware-Enabled Defense Project

The AI-native CrowdStrike Falcon platform is built to detect and protect against even the most advanced attacks. And as new research shows, it can further strengthen defenses when integrated with modern enterprise PC hardware.

A Deep Dive into DeepSeek

At a time when new AI models are constantly emerging, the launch of DeepSeek has led to questions and concerns around AI model security, data security, and national security. What is DeepSeek, and how was it trained? What are the risk implications of using it? Tune in for the answers to these questions and more in our first-ever video episode of the Adversary Universe podcast.

Proactive Security: Outpace the Adversary - CrowdStrike's AI-native Falcon Platform in Action

In today’s rapidly evolving cyber threat landscape, adversaries relentlessly refine their tactics to exploit vulnerabilities and breach enterprise environments. CrowdStrike’s AI-native Falcon Platform empowers teams with real-time detection, proactive exposure management, and at-scale remediation—ensuring a resilient defense against even the most sophisticated threats.

Solving for Exponential Data Growth in Next-Gen SIEM

Do you ever feel overwhelmed by the number of data sources you manage with your SIEM? How do you piece together different pieces of the puzzle like SOAR, threat intelligence, and security tools for endpoint, cloud, or identity? Do you actually know which tools are strengthening your security posture, and which are just adding more complexity?

Detect Data Exfiltration Techniques with Falcon Next-Gen SIEM

Sensitive data theft is among adversaries’ most common goals. For defenders, data exfiltration can lead to the compromise of customer data, public exposure of trade secrets, and potentially permanent business and reputational damage. Victims of data exfiltration may also face legal issues for non-compliance with data protection laws. This must be a top concern for businesses.

CrowdStrike Leads Agentic AI Innovation in Cybersecurity with Charlotte AI Detection Triage

AI has become both a powerful ally and a formidable weapon in today’s cybersecurity landscape. While AI enables security teams to detect and neutralize threats with unmatched speed and precision, adversaries are equally quick to exploit its potential with increasingly sophisticated and automated attacks. This duality has created an arms race in which organizations must not only adopt AI but continually innovate to stay ahead.

Naming Names: How Adversary Taxonomies Strengthen Global Security

Last month, during testimony on global cyber threats before the U.S. Committee on Homeland Security, a longstanding debate resurfaced: Why do vendors name different cyber threat actors, and can’t we directly call out those responsible? Industry veterans will recognize that a discourse on this topic tends to pop up in vendor, media, and public policy circles every few years.

CrowdStrike University Fast Track Fuels Cybersecurity Training

Organizations today battle an ever-evolving cyber threat landscape, yet many security teams struggle to keep pace due to a critical skills gap and limited access to high-quality training. As teams are expected to do more with fewer resources, cybersecurity education is essential. At CrowdStrike, we’re committed to breaking down these barriers.

See Falcon Data Protection in Action

Adversaries are after your sensitive data. Falcon Data Protection, part of the powerful CrowdStrike Falcon Platform, takes a modern approach to securing your enterprise data from adversaries. By combining content with context, see how Falcon Data Protection provides deep real-time visibility into what is happening with your sensitive data as they move from the source to the destination. CrowdStrike Falcon Data Protection.

See Falcon Endpoint Security in Action

Adversaries are relentless when they're targeting your endpoints. Experience CrowdStrike's state of the art Endpoint Security, which thwarts advanced threats by leveraging cutting edge AI and enabling advanced remediation actions, all in a simple to deploy unified architecture. Endpoint Security: ► Stop breaches with pioneering detection and response tightly integrated with real-time prevention across all key attack surfaces.

See CrowdStrike Falcon NG-SIEM in Action

In a world of stealthy, fast-moving threats and ever-increasing log volumes, defenders need an edge that’s orders of magnitude faster, smarter, and more scalable than current approaches. Watch this video to see how to detect and stop the adversary Odyssey Spider quickly with CrowdStrike Falcon Next-Gen SIEM. Seamlessly extend the capabilities of the world-leading CrowdStrike Falcon platform to all data sources while stopping breaches and slashing costs compared to siloed tools.

Improving Kubernetes Security: Lessons from an Istio Configuration Finding

As a part of our ongoing work to secure cloud computing infrastructure, we delved into the inner workings of some popular Kubernetes add-ons. Our first subject of research was Istio, a popular service mesh add-on. Istio is an open-source service mesh for Kubernetes that manages communication between microservices. It provides traffic management, security, and observability features without requiring code changes.

Caught in the Act: CrowdStrike's New ML-Powered LDAP Reconnaissance Detections

Early in the cyberattack kill chain, reconnaissance enables attackers to assemble critical network information to plan a tailored attack strategy. In this phase, adversaries aim to map out networks and their users, and locate system vulnerabilities, without setting off alarms. Proactive monitoring and early detection of this activity can disrupt attackers in their tracks and lower the risk of a breach.