Counter Adversary Operations

The Imperative to Secure Identities: Key Takeaways from Recent High-Profile Breaches
WebAssembly Is Abused by eCriminals to Hide Malware
CrowdStrike’s Advanced Memory Scanning Stops Threat Actor Using BRc4 at Telecommunications Customer
Compromised NPM Package Used in Supply Chain Attack: CrowdStrike Falcon® Customers Protected