Engineering & Tech

Enterprise Remediation with CrowdStrike and MOXFIVE, Part 2: Strategies for Containing and Recovering
3 Critical Steps for Application Security Teams in 2024
CrowdStrike Wins Frost & Sullivan 2024 Cloud Leadership Award
The Windows Restart Manager: How It Works and How It Can Be Hijacked, Part 2
The Windows Restart Manager: How It Works and How It Can Be Hijacked, Part 1
How CrowdStrike Uses Similarity-Based Mapping to Understand Cybersecurity Data and Prevent Breaches
Cracking the Code of AI Decision Making: Harnessing the Power of SHAP Values
Python 2to3: Tips From the CrowdStrike Data Science Team
CrowdStrike Releases New Update To Falcon Orchestrator
Reinventing Managed Detection and Response (MDR) with Identity Threat Protection
Playing Hide-and-Seek with Ransomware, Part 2
The Anatomy of Wiper Malware, Part 4: Less Common “Helper” Techniques
Playing Hide-and-Seek with Ransomware, Part 1
The Anatomy of Wiper Malware, Part 3: Input/Output Controls
The Anatomy of Wiper Malware, Part 2: Third-Party Drivers
The Importance of Integrated Endpoint and Workload Protection for IT and Security Operations
Decrypting NotPetya/Petya: Tools for Recovering Your MFT After an Attack
Squashing SPIDERS: Threat Intelligence, Threat Hunting and Rapid Response Stops SQL Injection Campaign
Who Needs Another Alert? CrowdScore Hunts Attackers Hidden in the Data
Likely eCrime Actor Uses Filenames Capitalizing on July 19, 2024, Falcon Sensor Content Issues in Operation Targeting LATAM-Based CrowdStrike Customers
Addressing Uneven Partition Lag in Kafka
From Data to Deployment: How Human Expertise Maximizes Detection Efficacy Across the Machine Learning Lifecycle
CrowdStrike Falcon® Prevents WannaCry Ransomware
Log4j2 Vulnerability "Log4Shell" (CVE-2021-44228)
How to Establish Cross-Border Transfer Systems that Help Protect Privacy
Holiday Cyber Warnings Will Echo Across 2021
How a Generalized Validation Testing Approach Improves Efficiency, Boosts Outcomes and Streamlines Debugging
Unexpected Adventures in JSON Marshaling
Modernize Your SOC with Falcon Fusion, CrowdStrike’s Integrated SOAR Framework
CrowdStrike’s New Methodology for Tracking eCrime
Improving Performance and Reliability of Internal Communication Among Microservices: The Story Behind the Falcon Sandbox Team’s gRPC Journey
The 5 Steps of Log Management: Essential Steps to Improve Observability, Enhance Security, and Monitor System and Application Performance
Nowhere to Hide: Detecting a Vishing Intrusion at a Retail Company
Re-searching Hyperparameters for Training Boosted Tree Models
How CrowdStrike Achieves Lightning-Fast Machine Learning Model Training with TensorFlow and Rust
Shlayer Malvertising Campaigns Still Using Flash Update Disguise
Virgin Hyperloop Protects IP, Augments Team with Falcon Complete and Falcon OverWatch Managed Services
How to Stay Cyber Aware of Weaknesses and Vulnerabilities in Your Environment
CrowdStrike Services Launches Log4j Quick Reference Guide (QRG)
A Principled Approach to Monitoring Streaming Data Infrastructure at Scale
Google Cloud + CrowdStrike: Transforming Security With Cloud-scale Multi-level Defense
Security Advisory: MSRPC Printer Spooler Relay (CVE-2021-1678)
CrowdStrike Falcon® Demonstrates Continued Excellence in Recent AV-Comparatives Evaluations
Blocking Fileless Script-based Attacks Using CrowdStrike Falcon®'s Script Control Feature
Building on the Shoulders of Giants: Combining TensorFlow and Rust
From the Board Room to the Dining Room: Making Cybersecurity Everyone’s Duty
The ICS/OT Landscape: How CrowdStrike Supports Through Partnerships With Rockwell and Others
The Rise and Fall of WebNavigatorBrowser: Chromium-based Adware Browser
Shift Left Security: The Magic Elixir for Securing Cloud-Native Apps
Press #1 to Play: A Look Into eCrime Menu-style Toolkits
Oh No! My Data Science Is Getting Rust-y
Defense Against the Lateral Arts: Detecting and Preventing Impacket’s Wmiexec
Helping Non-Security Stakeholders Understand ATT&CK in 10 Minutes or Less [VIDEO]
The Critical Role of Cybersecurity in M&A: Part 2, Pre-Close
CharCNNs and PowerShell Scripts: Yet Another Fight Against Malware
Sharding Kafka for Increased Scale and Reliability
CrowdStrike Uncovers New MacOS Browser Hijacking Campaign
Malware Analysis: GuLoader Dissection Reveals New Anti-Analysis Techniques and Code Injection Redundancy
Three Best Practices for Building a High-Performance Graph Database
Improving CrowdStrike Falcon® Detection Content with the Gap Analysis Team
Data Science & Machine Learning 101: Hunting the Unknown
Malicious Spear-Phishing Campaign Targets Upcoming Winter Olympics in South Korea
Situational Awareness: Cyber Threats Heightened by COVID-19 and How to Protect Against Them
Targeted Dharma Ransomware Intrusions Exhibit Consistent Techniques
Conversations with Charlotte AI: Scattered Spider
Demystifying Data Protection in the Cloud: Runtime vs. At Rest
DarkSide Pipeline Attack Shakes Up the Ransomware-as-a-Service Landscape
Modernize Log Monitoring to Accelerate Digital Transformation
Memorizing Behavior: Experiments with Overfit Machine Learning Models
I am Ironman: DEEP PANDA Uses Sakula Malware to Target Organizations in Multiple Sectors
INDRIK SPIDER Supersedes WastedLocker with Hades Ransomware to Circumvent OFAC Sanctions
Detecting Poisoned Python Packages: CTX and PHPass
Using Docker to Do Machine Learning at Scale
MITRE ATT&CK Evaluation Reveals CrowdStrike Falcon® as the Most Effective EDR Solution
CrowdStrike Falcon Platform Achieves 100% Detection and Protection Against MacOS Malware with Zero False Positives in Latest MacOS AV-TEST