Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

CrowdStrike

Log4j2 Vulnerability "Log4Shell" (CVE-2021-44228)

Apache has released version 2.16.0, which completely removes support for Message Lookups and disables JNDI by default. CrowdStrike has identified a malicious Java class file hosted on infrastructure associated with a nation-state adversary. The Java code is used to download known instances of adversary-specific tooling and is likely to be used in conjunction with the recently disclosed Log4Shell exploit (CVE-2021-44228).

How a Generalized Validation Testing Approach Improves Efficiency, Boosts Outcomes and Streamlines Debugging

In two recent blog posts from the CrowdStrike Software Development Engineers in Test (SDET) team, we explored how end-to-end validation testing and modular testing design could increase the speed and accuracy of the testing lifecycle. In this latest post, we conclude our SDET series with a deep dive on how our generalized validation testing component improves efficiency, enhances product functionality and streamlines troubleshooting.

Protecting Users from Malicious Sites with Falcon for Mobile

Protecting Users from Malicious Sites with Falcon for Mobile Falcon for Mobile protects users by preventing connections to malicious sites on both iOS and Android devices. Some examples of sources for these malicious connections are texts, emails, apps, or even QR codes. Falcon for mobile can block navigating to malicious sites and notifying the user why it was blocked, educating the user and reducing the risk in the future.

Brain Break from Fal.Con for Public Sector: Wizard Spider Threat Intel Highlight

Wizard Spider is a criminal group behind the core development and distribution of a sophisticated arsenal of criminal tools that allow them to run multiple different types of operations. This interview with Nina Padavil, Strategic Threat Advisor, CrowdStrike, and Robert Bruno, Commercial Illustrator, will highlight Wizard Spider’s targets, tactics and motivations. You don't have a malware problem, you have an adversary problem – stay ahead of the adversaries and learn more at the Adversary Universe.

Brain Break from Fal.Con for Public Sector: Judgment Panda Threat Intel Highlight

Judgment Panda is a highly capable adversary with a likely nexus to the Chinese Ministry of State Security. This interview with Jake Kwon, Strategic Threat Advisor, CrowdStrike, and Robert Bruno, Commercial Illustrator, will highlight Judgment Panda's targets, tactics and motivations. You don't have a malware problem, you have an adversary problem – stay ahead of the adversaries and learn more at the Adversary Universe.