Category: Cybersecurity Blog | CrowdStrike

Recognizing the Resilience of the CrowdStrike Community

Our annual Fal.Con user conference is always one of the highlights of my year because it’s a chance to spend time with some of my favorite people: our customers and partners. This year’s event has special meaning for me as…

How CrowdStrike Hunts, Identifies and Defeats Cloud-Focused Threats

Adversaries’ persistent efforts to evade advancements in threat awareness and defense have shaped a cyber threat landscape dominated by their stealthy, fast-moving tactics. As they expand into the cloud environments where most organizations now operate, the need to hunt and…

Innovations in Falcon Cloud Security at Fal.Con 2024

As we gather for Fal.Con 2024, we’re thrilled to unveil groundbreaking advancements in CrowdStrike Falcon® Cloud Security that are set to redefine cloud security. These innovations are more than just technical enhancements — they’re a bold step towards a future…

AI Innovation in the Spotlight at Fal.Con 2024

Every year, the role of AI in cybersecurity grows more prominent. This is especially true in the security operations center (SOC), where AI-native detection and GenAI-fueled workflows are advancing cyber defense and shaping the end-to-end analyst experience. But while defenders…

Exposure Management – Browser Extension Inventory

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Cybersecurity Blog | CrowdStrike Read the original article: Exposure Management – Browser Extension Inventory

May 2024 Patch Tuesday: Two Zero-Days Among 61 Vulnerabilities Addressed

Microsoft has released security updates for 61 vulnerabilities in its May 2024 Patch Tuesday rollout. There are two zero-day vulnerabilities patched, affecting Windows MSHTML (CVE-2024-30040) and Desktop Window Manager (DWM) Core Library (CVE-2024-30051), and one Critical vulnerability patched affecting Microsoft…

New CrowdStrike Capabilities Simplify Hybrid Cloud Security

CrowdStrike is excited to bring new capabilities to platform engineering and operations teams that manage hybrid cloud infrastructure, including on Red Hat Enterprise Linux and Red Hat OpenShift. Most organizations operate on hybrid cloud1, deployed to both private data centers…

5 Best Practices to Secure AWS Resources

Organizations are increasingly turning to cloud computing for IT agility, resilience and scalability. Amazon Web Services (AWS) stands at the forefront of this digital transformation, offering a robust, flexible and cost-effective platform that helps businesses drive growth and innovation.  However,…

5 Best Practices to Secure Azure Resources

Cloud computing has become the backbone for modern businesses due to its scalability, flexibility and cost-efficiency. As organizations choose cloud service providers to power their technological transformations, they must also properly secure their cloud environments to protect sensitive data, maintain…

CrowdStrike Is Proud to Sponsor the Mac Admins Foundation

CrowdStrike is proud to announce its official sponsorship of the Mac Admins Community through its not-for-profit arm, the Mac Admins Foundation. CrowdStrike joins a distinguished list of sponsors at the highest level. The Mac Admins Foundation serves as a vibrant…

Security Guidance from the Front Lines of Cloud Incident Response

In our first-ever Cloud Threat Summit, CrowdStrike’s Senior Vice President of Intelligence and Senior Director of Consulting Services discussed the most common ways adversaries breach the cloud and the steps organizations can take to stay safe. An insightful and engaging…

CrowdStrike Uncovers I2Pminer MacOS Mineware Variant

CrowdStrike analyzed an I2Pminer variant that targets macOS The mineware utilizes I2P to hide XMRig network traffic The CrowdStrike Falcon® platform provides continuous protection against mineware threats by offering real-time visibility across workloads CrowdStrike recently analyzed a macOS-targeted mineware campaign…

How to Ingest Data into Falcon LogScale Using Python

This post covers how to ingest data into CrowdStrike Falcon® LogScale from your MacOS platform using Python. This guide is great for setting up a one-node proof of concept (POC) so you can take advantage of LogScale’s free trial. Before…