Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How to Navigate the 2025 Identity Threat Landscape

Identity is at the center of the fight against adversaries. As threat actors weaponize legitimate credentials and sell access to the highest bidders, organizations must proactively detect and secure exposed identities to shut down potential attack paths before they can be exploited.

Mission-Critical Cybersecurity with Falcon for IT

See how CrowdStrike Falcon for IT helps organizations detect, respond to, and remediate threats like state-sponsored actor LIMINAL PANDA—all from a single, unified platform. This demo walks through real-time vulnerability management, patch deployment, and DISA STIG compliance enforcement at scale. Strengthen your cyber resilience with AI-powered automation and deep visibility into your enterprise environment.

Kubernetes IngressNightmare Vulnerabilities: What You Need to Know

We would like to recognize Amit Serper, Travis Lowe, Tony Gore, Adrian Godoy, Mihai Vasilescu, Suraj Sahu, Pablo Ramos, Raj Jammalamadaka, Lacie Griffin, and Josh Grunzweig for their contributions in authoring this publication. CrowdStrike is committed to protecting our customers from the latest disclosed vulnerabilities. We are actively monitoring activity surrounding “IngressNightmare,” the name given to recently identified vulnerabilities in the Kubernetes (K8s) ingress-nginx controller.

Meet LUNAR SPIDER: The Inner Workings of an eCrime Adversary

To anticipate threat actors’ behavior, we must understand them. That’s why CrowdStrike closely tracks the evolution and activity of 257 named adversaries, including the eCrime actor LUNAR SPIDER. “They almost behave like a startup; they’re constantly testing and innovating and developing what they’re doing,” Adam says of the group. “It’s an interesting paradigm when you think about how these eCrime actors operate.”

CrowdStrike Falcon Exposure Management Expands Security to Unmanaged Network Assets with Network Vulnerability Assessment

As organizations strengthen endpoint and cloud security, attackers are shifting their focus to often-overlooked network infrastructure like routers, switches, and firewalls. Legacy vulnerability management (VM) solutions struggle to keep pace, relying on slow, periodic scans that fail to provide real-time visibility into emerging threats.

Falcon Exposure Management Network Vulnerability Assessment: Demo Drill Down

Traditional network vulnerability scanners leave your critical network assets vulnerable, providing outdated visibility and ineffective prioritization. Falcon Exposure Management's Network Vulnerability Assessment (NVA) delivers real-time visibility, AI-powered prioritization with ExPRT.AI, and seamless integration for automated remediation. This demo showcases how NVA streamlines your security strategy, ensuring precise focus on threats that matter most and proactively protecting your network.

CrowdStrike Researchers Develop Custom XGBoost Objective to Improve ML Model Release Stability

Research is the cornerstone of CrowdStrike’s focus on innovation, and it enables us to stay a step ahead of the most sophisticated adversaries. The work of our dedicated team of researchers and data scientists is reflected in the industry-leading protection delivered by the AI-native CrowdStrike Falcon platform. This team is not only involved in groundbreaking new developments — it is also constantly exploring ways to make existing cybersecurity technology more effective.

CrowdStrike Achieves FedRAMP High Authorization

The evolving landscape of state-sponsored threats demands the highest levels of security for federal systems and critical infrastructure. As part of our longstanding commitment to protecting federal agencies and critical infrastructure, the AI-native CrowdStrike Falcon platform has achieved Federal Risk and Authorization Management Program (FedRAMP) High Authorization — the U.S. government’s most stringent cloud security standard.

Follow the Adversary: The Top 3 Red Team Exploitation Paths from 2024

Though 2024 may be behind us, many of the security threats and vulnerabilities that organizations faced last year remain. The CrowdStrike Professional Services Red Team tracks them all in its efforts to defend organizations against adversaries. The three most common exploitation paths we encountered were: In this blog, we break down these three critical exploitation paths, detailing how they occur and what steps organizations can take to mitigate them.

Securing XIoT in the Era of Convergence and Zero Trust

The rise of connected devices has fundamentally reshaped industries, enabling unprecedented levels of automation, efficiency, and innovation. These devices fall under the Extended Internet of Things (XIoT), a broad category encompassing traditional Internet of Things (IoT) devices, operational technology (OT), industrial control systems (ICS), the Internet of Medical Things (IoMT), and other connected assets that span enterprise IT and operational environments.

Falcon Cloud Security Identifies AI-Driven Packages in Container Images

Artificial intelligence (AI) is rapidly transforming industries, but with this innovation come new security challenges as threat actors explore AI’s powerful capabilities. They’re adopting new techniques, targeting AI models, injecting malicious code into AI processes, and exploiting vulnerabilities in AI-related software packages.

Falcon for IT Visibility + Response: Demo Drill Down

In today's rapidly evolving IT landscape, organizations need comprehensive visibility and immediate response capabilities to maintain operational resilience and security compliance. CrowdStrike's AI-native Falcon for IT empowers teams with real-time detection, automated remediation, and enterprise-wide control through a unified platform—transforming how organizations identify, respond to, and resolve critical IT challenges at scale.

NHS Matures Healthcare Cybersecurity with NCSC's CAF Assurance Model

The UK’s National Health Service (NHS) has transformed its approach to validating its level of cybersecurity maturity across healthcare by adopting the National Cyber Security Centre (NCSC) Cyber Assessment Framework (CAF). This shift is key to achieving the NHS’s broader goals: protecting patient data, ensuring uninterrupted healthcare delivery, and building the foundation for a fully digitized healthcare system by 2030.

Build Smarter Threat Detection with Next-Gen SIEM

SOC teams across businesses, industries, and geographies share the same goal: Stop cyberattacks before damage is done. But for those with legacy SIEMs, this is nearly impossible to achieve. Legacy SIEMs demand an overwhelming investment of time, resources, and expertise to set up and maintain.

NSOCKS: Insights into a Million-Dollar Residential Proxy Service

When an adversary wants to target an organization, they want to make it look like they’re coming from a regional or local internet service provider. This makes their activity seem more legitimate and buys time until they get caught. Proxies, which adversaries can use to conceal the origin of malicious traffic, are essential to this process.

Redefining Incident Response in the Modern Era

CrowdStrike Incident Response (IR) services sees firsthand why organizations facing today’s evolving threat landscape require advanced capabilities to detect, respond, and remediate cyberattacks in near real time. These observations continue to shape our approach to delivering unparalleled incident response.

4 Key Steps to Prevent Subdomain Takeovers

Adversaries don’t need to force their way in when they can slip through an organization’s overlooked assets. Subdomain takeovers are a prime example of how attackers exploit misconfigured or abandoned DNS records to gain access, launch phishing campaigns, distribute malware, or take other malicious actions — all while operating under the guise of a legitimate corporate domain.

Enriching Runtime Detection with Application Context

CrowdStrike Falcon ASPM now delivers enriched data to support endpoint and container detections in Falcon Cloud Security. This new feature integrates ASPM findings into runtime detections to improve visibility into risk, business criticality, and dependencies through cross-domain telemetry. This enhances runtime detection context by connecting application-specific data to refine threat detection and remediation efforts.

Falcon Cloud Security for Oracle Cloud Infrastructure

Falcon Cloud Security delivers fast, AI-powered protection for Oracle Cloud Infrastructure (OCI), providing real-time threat detection, compliance support, and risk remediation without disrupting performance. With instant visibility, frictionless deployment, and unified security across multi-cloud environments, organizations can secure their most critical OCI workloads while reducing complexity and operational overhead.

How Three Industry Leaders Are Stopping Identity-Based Attacks with CrowdStrike

The CrowdStrike 2025 Global Threat Report highlights the ongoing threat of identity-based attacks. Adversaries are increasingly exploiting stolen credentials to evade detection, and 79% of detections overall were classified as malware-free. Valid account abuse became the primary initial access method in 35% of cloud intrusions. The report also shares that access broker advertisements rose by 50% year-over-year, indicating a rise in demand for valid credentials and other forms of access.

Byte Back: Next-Generation Malware Classification Using Binary Transformers

In recent years, Transformer models have been the backbone of the revolution within the artificial intelligence sector. They are the basis of large language models (LLMs) and responsible for LLMs’ ability to understand and generate text of a human-like quality. Transformers are able to learn long-range interactions between words and sentences, allowing them to retain high-level concepts and insights into their training data.

CrowdStrike Falcon Cloud Security Introduces Application Context to Runtime Detections

Since CrowdStrike’s acquisition of Bionic, we have been embedding application security posture management (ASPM) capabilities into CrowdStrike Falcon Cloud Security, creating a unified solution that bridges the gap between proactive security for cloud security teams and cloud runtime protection for security operations. We are excited to share new ASPM updates in Falcon Cloud Security, built to help teams detect and respond faster to today’s cloud-focused adversaries.

Falcon Exposure Management: Internet Exposure Identification - Demo Drill Down

Unidentified internet-exposed assets create hidden security gaps, increasing the risk of cyberattacks and compliance violations. See how Falcon Exposure Management provides real-time visibility into external assets, prioritizes critical vulnerabilities, and enables swift remediation—helping you stay ahead of adversaries and protect business integrity. Subscribe and Stay Updated.

Intelligence-Led Threat Hunting: The Key to Fighting Cross-Domain Attacks

Cross-domain attacks have become a defining challenge in modern cybersecurity, with adversaries exploiting gaps across endpoints, identity systems, and cloud environments to achieve their objectives. These sophisticated attacks use stealthy, malware-free techniques and legitimate tools, making them exceptionally difficult to detect and disrupt.