Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Active Exploitation Observed for Linux Kernel Privilege Escalation Vulnerability (CVE-2024-1086)

Last week, CISA added CVE-2024-1086 to its Known Exploited Vulnerability Catalog. CVE-2024-1086, a use-after-free vulnerability in the Linux kernel’s netfilter, was disclosed on January 31, 2024 and assigned a CVSS of 7.8 (High). If successfully exploited, it could allow threat actors to achieve local privilege escalation. While there was no evidence of active exploitation at the time of disclosure, we have since observed adversaries targeting CVE-2024-1086 in the wild.

EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis

CrowdStrike is constantly researching, working and innovating to stay at the cutting edge of threat detection and response. Recently, these efforts include EMBERSim, a large-scale dataset developed to address limitations in binary code similarity (BCS), improve malware detection and facilitate future work in this area.

CrowdStrike Wins Frost & Sullivan 2024 Cloud Leadership Award

Frost & Sullivan named CrowdStrike the winner of its 2024 Customer Value Leadership Award in the global cloud security industry, reinforcing our dominance in cloud security at a time when the practice has never been more critical for organizations worldwide. According to the CrowdStrike 2024 Global Threat Report, cloud intrusions grew 75% year-over-year in 2023, with adversaries becoming more focused and persistent in the cloud.

Cybersecurity and Doughnuts: A Sweet Approach to Office Security

In the realm of office dynamics and cybersecurity, sometimes the simplest strategies are the most effective. One such strategy that has gained popularity here amongst our ranks is the penalty of buying doughnuts for the office whenever someone forgets to lock their computer when stepping away. This sweet approach not only keeps cybersecurity at the forefront of everyone’s mind but also fosters a sense of camaraderie and accountability.

Vendor Disruption May Have You Rethinking Your App Delivery Investments

ADC vendor landscape is experiencing a significant change as a result of acquisitions and shifting portfolio priorities among the two largest ADC vendors. That is bringing about uncertainty with customers who have relied on these vendors for their mission-critical application infrastructures. Businesses are built on applications, and for digital-first businesses, they are critical for driving revenue and delivering a positive customer experience.

DNS Server Hijacking Explained: Examples & Mitigation

The digital supply chain refers to the chain of third-party digital tools, services and infrastructure that a company depends on for a particular first-party service (such as their website or SaaS platform). In an ever-changing digital landscape, supply chains can be brittle with many unseen risks. The nature of supply chain risk is transitive; any part of the often long and complicated digital supply chain can be compromised, causing all components downstream of it to also be compromised.

Securing Vendor Risk Management Onboarding in 2024

Onboarding is perhaps the most precarious phase of the Vendor Risk Management process. A single oversight could expose your organization to dangerous third-party security risks, increasing your chances of suffering a data breach. This post explains how to bolster the most vulnerable access points of the vendor onboarding process to help you securely scale your VRM program.

A Guide to Vendor Risk Management Reporting in 2024

Vendor Risk Management encompasses a wide range of cybersecurity risk factors. As such, a VRM report design could range from highly detailed to concise, depending on the specific reporting requirements of stakeholders and the board. This list represents the most comprehensive scope of third-party risk management information to fit the broadest range of VRM reporting use cases.

Surge in CatDDoS Attacks: Exploiting Vulnerabilities to Spread Mirai Variant

The cybersecurity landscape has recently been shaken by a surge in activity involving a Mirai distributed denial-of-service (DDoS) botnet variant known as CatDDoS. Over the past three months, threat actors have aggressively exploited more than 80 vulnerabilities to spread this malware. In this blog, we explore the recent CatDDoS attacks, the targeted sectors, and the implications for cybersecurity practices.

Emerging Threat: Attackers Target Check Point VPNs to Breach Corporate Networks

In the ever-evolving landscape of cybersecurity, the tools designed to protect us can sometimes become our greatest vulnerabilities. This paradox is becoming evident as attackers increasingly target Check Point VPNs, exploiting them to gain initial access to corporate networks. Recent findings highlight a growing trend where cybercriminals are leveraging vulnerabilities in remote access VPNs, posing a significant risk to organizational security.