Category: https://www.crowdstrike.com/blog/feed

Custom Alerts for IT Hygiene

Read the original article: Custom Alerts for IT Hygiene Introduction As many organizations around the globe are settling into longer-term remote working situations for their employees, IT Hygiene should be at the forefront of preventative security protocol. Adversaries are getting…

The Current State of Exploit Development, Part 2

Read the original article: The Current State of Exploit Development, Part 2 In Part 1 of this two-part blog series, we addressed binary exploitation on Windows systems, including some legacy and contemporary mitigations that exploit writers and adversaries must deal…

PowerShell Hunting with CrowdStrike Falcon

Read the original article: PowerShell Hunting with CrowdStrike Falcon Introduction Threat hunting is the active search for new and novel attack behaviors that aren’t detected by current automated methods of prevention and detection.  Threat hunting starts with human analysts, who…

How to Use Custom Filters in Falcon Spotlight

Read the original article: How to Use Custom Filters in Falcon Spotlight Introduction This article and video will provide an overview of the power of custom filters in Falcon Spotlight. Spotlight provides customers with realtime data about the vulnerabilities in…

Reducing the Attack Surface with Custom Indicators of Attack

Read the original article: Reducing the Attack Surface with Custom Indicators of Attack Introduction The evolving nature of malicious activity is keeping security teams on their toes. Adversaries may start with commodity malware but quickly shift tactics as they encounter…

The Current State of Exploit Development, Part 1

Read the original article: The Current State of Exploit Development, Part 1 Memory corruption exploits have historically been one of the strongest accessories in a good red teamer’s toolkit. They present an easy win for offensive security engineers, as well…

Securing Elections Globally: How CrowdStrike Is Helping

Read the original article: Securing Elections Globally: How CrowdStrike Is Helping As a global leader in protecting elections, we want to explain our perspective on election security issues and share some resources with the elections community. Free and fair elections…

Actionable Indicators to Protect a Remote Workforce

Read the original article: Actionable Indicators to Protect a Remote Workforce Introduction As the world continues to adjust to the new reality of employees working from anywhere and at any time, security teams are working overtime to protect users from…

Attackers Are Trying to Take a Bite Out of the Apple

Read the original article: Attackers Are Trying to Take a Bite Out of the Apple Over the past year, CrowdStrike® Services has observed threat actors increasingly targeting macOS environments — and using relatively unsophisticated methods to gain access. Even though…

Manufacturing Industry in the Adversaries’ Crosshairs

Read the original article: Manufacturing Industry in the Adversaries’ Crosshairs Since January 2020, the CrowdStrike® Falcon OverWatch™ managed threat hunting team has observed an escalation in hands-on-keyboard activity. The COVID-19 pandemic has fundamentally shifted the way businesses are working, and…

Manufacturing Industry in the Adversaries’ Crosshairs

Read the original article: Manufacturing Industry in the Adversaries’ Crosshairs Since January 2020, the CrowdStrike® Falcon OverWatch™ managed threat hunting team has observed an escalation in hands-on-keyboard activity. The COVID-19 pandemic has fundamentally shifted the way businesses are working, and…

Flexible Policy Management for Remote Systems

Read the original article: Flexible Policy Management for Remote Systems Introduction As organizations shift to supporting more remote workers, protection policies for laptops and systems that are no longer behind traditional perimeter defenses need to be updated. Can administrators quickly…

System Recovery using Real Time Response

Read the original article: System Recovery using Real Time Response Introduction Cyberattacks including ransomware have increased as work environments have changed, and organizations have shifted to supporting more remote personnel. With threats increasing against these remote systems, the ability to…

GuLoader: Peering Into a Shellcode-based Downloader

Read the original article: GuLoader: Peering Into a Shellcode-based Downloader GuLoader, a malware family that emerged in the wild late last year, is written in Visual Basic 6 (VB6), which is just a wrapper for a core payload that is…

Expanding Protection with Remote System Control

Read the original article: Expanding Protection with Remote System Control Introduction Sinkholes can be used by both bad actors and system administrators alike. Bad actors can redirect systems to malicious domains and security admins can stop systems from reaching those…

We Stop. So You Can Go.

Read the original article: We Stop. So You Can Go. In March 2020, at the beginning of the U.S. response to the worldwide COVID-19 pandemic, I expressed my gratitude for the healthcare workers and other first responders who put themselves…

CrowdStrike Incident Workbench Speeds Incident Response

Read the original article: CrowdStrike Incident Workbench Speeds Incident Response Recently, CrowdStrike introduced the new CrowdStrike® Incident Workbench, a more effective and efficient way to visualize and prioritize security incidents. With alert fatigue so prevalent among security teams, CrowdScore™ and…

How CrowdStrike Secures Cloud Workloads

Read the original article: How CrowdStrike Secures Cloud Workloads Introduction The CrowdStrike solution has been designed to provide proven endpoint protection to all workloads, regardless of their location. CrowdStrike Falcon protects physical servers and virtual machines in private data centers…

Threat Hunting with a Remote Workforce

Read the original article: Threat Hunting with a Remote Workforce Introduction In the world of cybersecurity, adversaries and defenders are constantly trying to outmaneuver each other and gain strategic advantage.  For example, attackers are keenly aware that the shift to…

Attackers Are Targeting Cloud Service Providers

Read the original article: Attackers Are Targeting Cloud Service Providers Companies are increasingly relying on cloud-based infrastructure, especially as more of their employees are working remotely — and may continue to do so. Public, private and hybrid clouds allow access…

Remote Internships: One-time Necessity or the Next Big Thing?

Read the original article: Remote Internships: One-time Necessity or the Next Big Thing? For some university students, the impact of COVID-19 closures has gone from disappointing to devastating, as social distancing measures and stay-at-home orders cancel everything from sports seasons…

Remediation with a Remote Workforce

Read the original article: Remediation with a Remote Workforce Introduction Remote systems can be easy targets for attackers. When these systems are compromised, responders need to work quickly to understand the attack and take action to remediate. The responders need…

Lateral Movement Detection with a Remote Workforce

Read the original article: Lateral Movement Detection with a Remote Workforce Introduction The shift to a larger remote workforce has expanded the attack surface for many organizations. With fewer traditional defenses in place, a remote system can be an easy…

Employing FeatureUsage for Windows 10 Taskbar Forensics

Read the original article: Employing FeatureUsage for Windows 10 Taskbar Forensics During a cybersecurity investigation, digital forensics and incident response (DFIR) professionals need to obtain information from different artifacts to determine exactly what has occurred on a machine. When performing…

Falcon X – Intelligent Alerts for a Remote Workforce

Read the original article: Falcon X – Intelligent Alerts for a Remote Workforce Introduction The widespread impact of the new coronavirus has not deterred cyber adversaries. In fact, quite the opposite is happening. In times of crisis, adversaries often try…

Oh No! My Data Science Is Getting Rust-y

Read the original article: Oh No! My Data Science Is Getting Rust-y Python is one of the most popular programming languages for data scientists — and for good reason. The Python Package Index (PyPI) hosts a vast array of impressive…

The Business Case for “Remote-First”

Read the original article: The Business Case for “Remote-First” How a distributed workforce enables better performance, stronger results and a positive culture Imagine it’s 2 a.m. ET on July 4. A New York-based financial services company is being targeted by…

The Business Case for “Remote-First”

Read the original article: The Business Case for “Remote-First” How a distributed workforce enables better performance, stronger results and a positive culture Imagine it’s 2 a.m. ET on July 4. A New York-based financial services company is being targeted by…