Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Rise of Cross-Domain Attacks Demands a Unified Defense

Modern adversaries are quiet. No longer reliant on clunky malware to breach their targets, they have adopted more subtle and effective methods to infiltrate businesses, move laterally and access critical applications, steal data, impersonate users and more. They are also gaining speed: The average eCrime breakout time, now just 62 minutes, has fallen in recent years as adversaries accelerate from initial intrusion to lateral movement.

CrowdStrike Announces Falcon Identity Protection for AWS IAM Identity Center

As organizations scale their operations on Amazon Web Services (AWS), they must secure their identities and ensure all users have the correct permissions. AWS IAM Identity Center is built to simplify access management across multiple AWS accounts — a critical tool for rapidly growing AWS environments. This hub for identity data and processes demands strong protection against the identity-focused threats growing popular among today’s adversaries.

One Year of Falcon Go: Transforming Cybersecurity for Small Businesses

Small business owners are wearing more hats than ever before. Along with managing operations, sales, innovation, customer satisfaction and more, they must also stay on top of trends that can affect their business trajectory — including cybersecurity and the ever-evolving range of cyber threats.

CrowdStrike Enhances Active Directory Auditing in Falcon Identity Protection

Identity is the new battleground in today’s rapidly evolving cyber threat landscape. Microsoft Active Directory (AD), a cornerstone of enterprise identity management, is a frequent target for attackers. For organizations, protecting these critical environments without adding complexity is essential. Many organizations struggle to get full visibility into changes made within Active Directory.

CrowdStrike Falcon Prevents Multiple Vulnerable Driver Attacks in Real-World Intrusion

BYOVD involves adversaries writing to disk and loading a legitimate, but vulnerable, driver to access the kernel of an operating system. This allows them to evade detection mechanisms and manipulate the system at a deep level, often bypassing protections like EDR. For the exploitation to succeed, attackers must first ensure the driver is brought on the target system. This is followed by the initiation of a privileged process to load the driver, setting the stage for further malicious activities.

CrowdStrike Partners with MITRE Center for Threat-Informed Defense to Launch Secure AI Project

As organizations deploy more AI-enabled systems across their networks, adversaries are taking note and using sophisticated new tactics, techniques and procedures (TTPs) against them. The need for continued innovation to fight these threats is paramount.

CrowdStrike and Cribl Expand Partnership with CrowdStream for Next-Gen SIEM

While SIEM solutions have existed for decades now, the market has faced recent upheaval with the advent of cloud-native solutions and a surge of mergers and acquisitions in the last year. As the SIEM market undergoes seismic shifts, CrowdStrike and Cribl have joined forces to help SOCs with their modernization journey. We’re pleased to share that CrowdStrike and Cribl are expanding our partnership to help organizations take the next step in their SIEM journey.

CrowdStrike Strengthens SMB Security with Seamless Mobile Protection

Small and medium-sized businesses (SMBs) face many of the same cybersecurity threats as large enterprises but often lack the resources to maintain robust security across all devices. As SMBs rely on a growing number of smartphones and tablets, they must defend against a range of mobile-focused cyberattacks. The need for comprehensive security has never been more urgent.

Unveiling LIMINAL PANDA: A Closer Look at China's Cyber Threats to the Telecom Sector

On Tuesday, November 19, 2024, Adam Meyers, CrowdStrike Senior Vice President of Counter Adversary Operations, will testify in front of the U.S. Senate Judiciary Subcommittee on Privacy, Technology, and the Law on Chinese cyber threats to critical infrastructure. Within his testimony, Adam will speak publicly for the first time about a China-nexus state-sponsored actor that CrowdStrike Counter Adversary Operations tracks as LIMINAL PANDA.

Pegasystems Consolidates Endpoint, Identity and Cloud Security with CrowdStrike

Pegasystems, a global leader in AI-powered decisioning and workflow automation, is a strategic partner for many of the world’s leading brands. The company’s role as an enterprise software provider means it often operates under the radar of the general public — but that doesn’t shield it from cyberattacks. Upon joining Pegasystems (Pega) in 2019, Director of Corporate Security Operations Steve Tieland quickly realized the company's legacy antivirus solution was missing the mark.