CrowdStrike Intelligence Team

SCATTERED SPIDER Exploits Windows Security Deficiencies with Bring-Your-Own-Vulnerable-Driver Tactic in Attempt to Bypass Endpoint Security
CrowdStrike Falcon® Platform Identifies Supply Chain Attack via a Trojanized Comm100 Chat Installer
Callback Malware Campaigns Impersonate CrowdStrike and Other Cybersecurity Companies
For the Common Good: How to Compromise a Printer in Three Simple Steps
Access Brokers: Who Are the Targets, and What Are They Worth?
LemonDuck Targets Docker for Cryptomining Operations
Technical Analysis of the WhisperGate Malicious Bootloader
Log4j2 Vulnerability "Log4Shell" (CVE-2021-44228)
ECX: Big Game Hunting on the Rise Following a Notable Reduction in Activity
How Artificial Intelligence is Becoming a Key Weapon in the Cybersecurity War
CCleaner Stage 2: In-Depth Analysis of the Payload
SUNSPOT: An Implant in the Build Process