Category: Blog – crowdstrike.com

The Anatomy of Wiper Malware, Part 2: Third-Party Drivers

In Part 1 of this four-part blog series examining wiper malware, we introduced the topic of wipers, reviewed their recent history and presented common adversary techniques that leverage wipers to destroy system data.  In Part 2, CrowdStrike’s Endpoint Protection Content…

The Easy Solution for Stopping Modern Attacks

This article has been indexed from Blog – crowdstrike.com Modern cyberattacks are multifaceted, leveraging different tools and techniques and targeting multiple entry points. As noted in the CrowdStrike 2022 Global Threat Report, 62% of modern attacks do not use traditional…

Protecting Cloud Workloads with CrowdStrike and AWS

This article has been indexed from Blog – crowdstrike.com Migrating to the cloud has allowed many organizations to reduce costs, innovate faster and deliver business results more effectively. However, as businesses expand their cloud investments, they must adapt their security…

Access Brokers: Who Are the Targets, and What Are They Worth?

This article has been indexed from Blog – crowdstrike.com Access brokers have become a key component of the eCrime threat landscape, selling access to threat actors and facilitating myriad criminal activities. Many have established relationships with big game hunting (BGH)…

Why the Most Effective XDR Is Rooted in Endpoint Detection and Response

This article has been indexed from Blog – crowdstrike.com Extended detection and response (XDR) solutions deliver powerful capabilities to help security teams fight adversaries by increasing visibility, simplifying operations and accelerating identification and remediation across the security stack. XDR platforms…

How to Automate Workflows with Falcon Spotlight

This article has been indexed from Blog – crowdstrike.com Introduction Falcon Spotlight leverages the existing Falcon Agent to assess the status of vulnerabilities across the environment. While visibility and filtering capabilities are part of the user interface, this article will…