Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

CrowdStrike Named a Strong Performer in Forrester Wave for Unified Vulnerability Management

CrowdStrike is proud to be named a Strong Performer in The Forrester Wave: Unified Vulnerability Management Solutions, Q3 2025. We believe this recognition underscores the strength of CrowdStrike’s vision, the pace of our innovation, and the rapid adoption of CrowdStrike Falcon Exposure Management by customers transforming their vulnerability management, just 24 months after its launch.

CrowdStrike Detects and Blocks Widespread SharePoint Zero-Day Exploitation

Beginning on July 18, 2025, at approximately 0700 UTC, CrowdStrike Falcon Complete Next-Gen MDR and CrowdStrike Falcon Adversary OverWatch identified a wave of Microsoft SharePoint exploitation attempts by an unknown adversary. Two distinct zero-day vulnerabilities were made publicly available: a critical remote code execution vulnerability (CVE-2025-53770) and a server spoofing vulnerability (CVE-2025-53771).

Falcon Cloud Security - Accelerate Cloud investigations powered by Charlotte AI

Charlotte AI automatically triages detections with supporting evidence, autonomously generates and answers prioritized questions, and embeds AI reasoning directly into workflow automation to drive scalable action across cloud environments. Subscribe and Stay Updated:► Don't miss out on more exciting content! Subscribe to our channel for the latest updates, case studies, and more from the world of cybersecurity. Hit the bell icon to receive notifications whenever we post new videos. Thank you for watching!

What's New in CyCognito: July 2025 Platform Enhancements

Visibility without control is only half the battle. To truly stay ahead of attackers, security teams need precise access, trusted data, and efficient workflows they can rely on. That’s why we’re continuing to enhance the CyCognito platform with features that improve transparency, streamline operations, and put more power in your hands.

CYJAX Launches Advanced Payment Fraud Intelligence Platform to Help Financial Institutions Stay Ahead of Evolving Threats

CYJAX, a leading provider of real-time cyber threat intelligence, today announced the launch of its next-generation Payment Fraud Intelligence platform, a proactive solution designed to help financial institutions detect, mitigate, and prevent payment fraud before it occurs. In today’s fast-paced threat landscape, fraud teams are expected to detect, act, and refund: fast.

SBOM 101: A Complete Guide to Software Bill of Materials

Code reuse has become a foundational practice in modern software development. Some estimates suggest that over 80% of developers today re-use existing code, rather than writing code from scratch, when building software applications. This trend is largely due to the open-source movement, as one might call it. There exists a massive, ever-growing public repository of open-source libraries, frameworks, and components.

Why Agentic Security Doesn't Mean Letting Go of Control

Autonomous agents are changing the way we think about security. Not in the distant future, right now. These systems (intelligent, self-directed, and capable of making decisions) are starting to play an active role in the SOC. They’re not only collecting data; they’re analyzing it, correlating alerts, prioritizing risks, and even initiating response actions. This is Agentic AI, and it makes people nervous. In security, autonomy often gets mistaken for loss of control.