thomasetheridge
Managed Threat Hunting Meets the Challenge of the Tenacious Adversary
With the end of the year fast approaching, many of us are looking forward to a well-deserved break. However, security practitioners and security leaders worldwide are bracing themselves for what has b[…]
2022 Threat Hunting Report: Falcon OverWatch Looks Back to Prepare Defenders for Tomorrow’s Adversaries
Another turbulent year for cybersecurity finds itself right at home alongside global economic headwinds and geopolitical tensions. This year has been defined by rampant affiliate activity, a seemingly[…]
’Tis the Season for eCrime
Over the past year, CrowdStrike® Services has observed threat actors increasingly targeting macOS environments — and using relatively unsophisticated methods to gain access. Even though workplace macO[…]
CrowdStrike and NIST 800-53: Now That’s What I Call a “Twofer”
Companies are increasingly relying on cloud-based infrastructure, especially as more of their employees are working remotely — and may continue to do so. Public, private and hybrid clouds allow access[…]
The Wand Is Only as Good as the Magician: Getting the Most From Prevention Tools
As organizations deal with newly remote workers and business uncertainty, prevention is more important than ever. Cyberattackers are looking to capitalize on the current climate and seek vulnerabiliti[…]
Getting the Bacon from the Beacon
A new report from independent research firm Vanson Bourne titled The 2019 Global Security Attitude Survey studies how organizations assess their cybersecurity readiness in the face of an increasingly […]
Programs Hacking Programs: How to Extract Memory Information to Spot Linux Malware
The Challenge The increasing sophistication and frequency of adversary infiltration and exploit attacks has forced many organizations to play a continuous high-stakes version of “whack-a-mole” with th[…]
Investigating PowerShell: Command and Script Logging
The much-anticipated CrowdStrike® Cyber Intrusion Services Casebook for 2017 offers detailed accounts of some of the cases the CrowdStrike Services incident response (IR) team has investigated over th[…]