Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Blog

Millions of Kia Vehicles Exposed to Remote Hacks via License Plate: The Growing Risk of Automotive API Vulnerabilities

In an increasingly connected world, the lines between digital security and physical safety are rapidly blurring. The automotive industry, now more reliant on connectivity than ever before, faces a new wave of cybersecurity threats. Millions of Kia vehicles, ranging from the 2013 model year to 2025, were recently found to be vulnerable to remote hacking via license plate information.

Six Key Measures for Upholding Election Security and Integrity

Decision 2024 – the ultimate election year – is in full swing, with more than 60 countries holding national elections this cycle. In the United States, where presidential candidates are polling neck and neck and stakes are high, this “first true AI election” has brought election security to the forefront of the conversation.

Asia's Evolving AI Regulatory Landscape: Lessons from Cybersecurity Regulation

Artificial intelligence (AI) is transforming industries across Asia, driving innovation, economic growth, and societal advancements. However, AI’s profound impact also brings significant governance challenges. As with any transformative technology, robust regulatory frameworks are essential to mitigate risks, ensure ethical use, and protect public interests. Reflecting on the evolution of cybersecurity regulation may provide insight into how AI regulation might develop.

CrowdStrike Named a Major Player in IDC MarketScape: Worldwide SIEM for Enterprise 2024

CrowdStrike is excited to announce we are named a Major Player in the IDC MarketScape: Worldwide SIEM for Enterprise 2024 Vendor Assessment.1 This marks our first appearance in a SIEM-focused analyst report since bringing CrowdStrike Falcon Next-Gen SIEM to market less than a year ago. We believe this milestone speaks volumes about our commitment to revolutionizing security operations.

CrowdStrike Named a Leader in the 2024 Forrester Wave: Attack Surface Management Solutions

CrowdStrike is proud to be named a Leader in The Forrester Wave: Attack Surface Management Solutions, Q3 2024. Our position as a Leader reinforces our belief that the rapid expansion of modern attack surfaces requires a powerful, unified solution — and CrowdStrike Falcon Exposure Management provides the critical capabilities modern organizations need.

Supporting Victims and Empowering Recovery - CyberAwareness Month 2024

As the digital world continues to grow, so do the threats within it. Cybercrime is no longer just an online inconvenience—it’s a serious issue affecting real lives, families, and communities. In recognition of Cyber Awareness Month this October, The Cyber Helpline is launching a crucial campaign to raise £50,000 to expand and enhance our vital services for victims of online harm.

Understanding and Detecting Lateral Movement

A ransomware attack is underway. The threat actor has gained initial access to an endpoint and executed malicious code on it. As far as the threat actor is concerned, things are going well. However, the next stage is critical to a ransomware attack’s success. Without the ability to spread throughout the entire environment, encrypting or locking up all systems, threat actors are unlikely to be able to extort payment from an organization.

6 Threat Modeling Examples for DevSecOps

As organizations push the boundaries of innovation, the need to embed security into every layer of the development process has never been more pressing. DevSecOps—a practice that integrates security directly into the DevOps pipeline—has emerged as a critical approach to staying ahead of potential threats. Yet, the challenge is knowing how to weave security seamlessly into these complex, fast-moving environments.

Unlocking the Power of Secure Identities with Identity-as-a-Service (IDaaS)

As businesses continue to embrace cloud services for scalability and cost efficiency, cybersecurity is following a similar trend. To stay ahead of evolving threats, companies are increasingly adopting Identity-as-a-Service (IDaaS) as a comprehensive solution. Leveraging cutting-edge technologies, Managed Service Providers (MSPs) deliver Identity Security to help businesses achieve key objectives.