What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
CrowdStrike.webp 2023-06-12 00:52:24 Les adversaires sont pratiques au Japon: connaissez la menace et connaissez la solution
Adversaries Go Hands-On in Japan: Know the Threat and Know the Solution
(lien direct)
Le Japon, connu pour son innovation et son efficacité, est un leader de l'industrie mondialement reconnu.Cela met en danger les organisations basées au Japon d'être reconnus comme des cibles potentiellement précieuses par des cyber-adversaires à motivation pénale et ciblée.Ce blog, directement à partir des lignes de front de Crowdsstrike & Reg;Falcon Overwatch ™ Menace Hunting, partage des informations d'intrusion tirées de l'activité observée dans [& # 8230;]
Japan, known for its innovation and efficiency, is a globally recognized industry leader. This puts Japan-based organizations at risk of being recognized as potentially valuable targets by both criminally motivated and targeted cyber adversaries. This blog, directly from the front lines of CrowdStrike® Falcon OverWatch™ threat hunting, shares intrusion insights drawn from activity observed in […]
Threat ★★
CrowdStrike.webp 2023-06-09 20:30:42 Donner un sens à la toile sombre avec Falcon Intelligence Recon +
Making Sense of the Dark Web with Falcon Intelligence Recon+
(lien direct)
L'immensité de la toile profonde et sombre peut facilement faire des tentatives de surveillance des cyber-menaces dans un tuyau d'incendie d'informations inutiles.Une partie du problème est la nature des flux de données qui doivent être surveillés.Chaque jour, davantage de références sont volées et exposées.Les forums criminels illégaux sont pleins de spams répétés [& # 8230;]
The vastness of the deep and dark web can easily turn attempts to monitor for cyber threats into a firehose of useless information. Part of the problem is the nature of the data streams that need to be monitored. Every day, more credentials are stolen and exposed. Illegal criminal forums are full of repeated spamming […]
★★
CrowdStrike.webp 2023-06-06 21:00:48 Soutenir nos héros: le programme Skillbridge relie les anciens combattants aux stages Crowdsstrike
Supporting Our Heroes: SkillBridge Program Connects Veterans with CrowdStrike Internships
(lien direct)
Skillbridge, un programme parrainé par le ministère américain de la Défense, aide les membres du service de transition de toutes les succursales des stages militaires sécurisés avec des partenaires d'entreprise.En tant que partisan constant de la communauté militaire, Crowdstrike est fier de participer au programme Skillbridge.Crowdsstrike a une longue histoire de défense des anciens combattants.En plus de notre collaboration [& # 8230;]
SkillBridge, a program sponsored by the U.S. Department of Defense, helps transitioning service members from all branches of the military secure internships with corporate partners. As a steadfast supporter of the military community, CrowdStrike is proud to participate in the SkillBridge program. CrowdStrike has a long history of championing veterans. In addition to our collaboration […]
★★
CrowdStrike.webp 2023-06-06 11:11:47 CrowdStrike définit l'avenir de la sécurité du cloud avec un XDR en un clic pour identifier automatiquement et sécuriser les actifs cloud non gérés
CrowdStrike Defines the Future of Cloud Security with One-Click XDR to Automatically Identify and Secure Unmanaged Cloud Assets
(lien direct)
CrowdStrike définit l'avenir de la sécurité du cloud en permettant aux clients de comprendre rapidement leur risque de cloud et de détecter, prévenir et corriger les menaces axées sur le cloud.Aujourd'hui, nous annonçons une série de nouvelles innovations sur la sécurité cloud conçues pour offrir une visibilité complète dans les chemins d'attaque potentiels, du point de terminaison au cloud et sécurisé instantanément des charges de travail de cloud vulnérables [& # 8230;]
CrowdStrike is defining the future of cloud security by empowering customers to rapidly understand their cloud risk and to detect, prevent and remediate cloud-focused threats. Today we are announcing a series of new cloud security innovations designed to deliver complete visibility into potential attack paths, from endpoint to cloud, and instantly secure vulnerable cloud workloads […]
Cloud ★★
CrowdStrike.webp 2023-06-05 12:48:38 Movin \\ 'Out: identifier l'exfiltration des données dans les enquêtes de transfert Moveit
Movin\\' Out: Identifying Data Exfiltration in MOVEit Transfer Investigations
(lien direct)
Points récapitulatifs Les organisations du monde entier continuent de découvrir les retombées du transfert Moveit Exploit CVE-2023-34362 Les répondeurs incidents en crowdsstrike ont identifié des preuves d'exfiltration de fichiers de masse à partir de l'application Movenit, à la suite de l'activité de webshell sur l'activité d'exfiltration de données de mouvement de mouvement compromise des systèmes de déplacement des systèmes de déplacement des systèmes Moveit.Peut être identifié en analysant la base de données d'application Moveit et [& # 8230;]
Summary Points Organizations around the globe continue to experience the fallout of the MOVEit Transfer exploit CVE-2023-34362  CrowdStrike incident responders have identified evidence of mass file exfiltration from the MOVEit application, as a result of the webshell activity on compromised MOVEit systems Data exfiltration activity can be identified by analyzing the MOVEit application database and […]
★★
CrowdStrike.webp 2023-06-02 20:09:55 CrowdStrike améliore Falcon Discover pour réduire la surface d'attaque, rationaliser les opérations et réduire les coûts
CrowdStrike Enhances Falcon Discover to Reduce the Attack Surface, Streamline Operations and Lower Costs
(lien direct)
Crowdsstrike Falcon & Reg;Discover offre une visibilité approfondie des actifs sans matériel à déployer ou à gérer, offrant un contexte précieux pour tous vos actifs.Pour les équipes et les équipes de sécurité, Falcon Discover est un outil puissant pour arrêter les violations.La majorité des clients Crowdsstrike utilisent déjà Falcon Discover pour améliorer leur posture informatique et de sécurité.Continuer [& # 8230;]
CrowdStrike Falcon® Discover delivers deep asset visibility with no hardware to deploy or manage, providing valuable context for all of your assets. For IT and security teams alike, Falcon Discover is a powerful tool to stop breaches.  The majority of CrowdStrike customers already use Falcon Discover to improve their IT and security posture. To continue […]
Tool ★★
CrowdStrike.webp 2023-06-01 11:30:59 CrowdStrike investit et s'associe à la sécurité prélude pour générer des tests et une validation de sécurité continus pour nos clients
CrowdStrike Invests in and Partners with Prelude Security to Drive Continuous Security Testing and Validation for Our Customers
(lien direct)
La gestion de la posture de sécurité à grande échelle est un défi important pour les organisations mondiales de toutes tailles.Avec un domaine de sécurité en pleine expansion et un écart mondial de travailleurs de 3,4 millions, selon (ICS) 2, il est impératif que l'efficacité des contrôles défensives soit maximisée pour lutter contre les adversaires sophistiqués.Pour ce faire efficacement, les organisations doivent [& # 8230;]
Managing security posture at scale is a significant challenge for global organizations of all sizes. With a rapidly expanding security estate and a global worker gap of 3.4 million, according to (ICS)2, it is imperative that the efficacy of defensive controls is maximized to combat sophisticated adversaries. In order to do so effectively, organizations must […]
★★
CrowdStrike.webp 2023-02-28 06:21:51 CrowdStrike 2023 Global Threat Report: Resilient Businesses Fight Relentless Adversaries (lien direct) The CrowdStrike 2023 Global Threat Report, among the most trusted and comprehensive research on the modern threat landscape, explores the most significant security events and trends of the previous year, as well as the adversaries driving this activity. The latest edition of the CrowdStrike Global Threat Report comes at a critical time for organizations around […] Threat ★★
CrowdStrike.webp 2023-02-23 19:46:09 How to Ingest Data into Falcon LogScale Using Python (lien direct) This post covers how to ingest data into CrowdStrike Falcon® LogScale from your MacOS platform using Python. This guide is great for setting up a one-node proof of concept (POC) so you can take advantage of LogScale’s free trial. Before you can write your ingest client, you must prepare a good foundation. That means preparing […] ★★
CrowdStrike.webp 2023-02-23 08:16:05 CrowdStrike Uncovers I2Pminer MacOS Mineware Variant (lien direct) CrowdStrike analyzed an I2Pminer variant that targets macOS The mineware utilizes I2P to hide XMRig network traffic The CrowdStrike Falcon® platform provides continuous protection against mineware threats by offering real-time visibility across workloads CrowdStrike recently analyzed a macOS-targeted mineware campaign that utilized malicious application bundles to deliver open source XMRig cryptomining software and Invisible Internet […] Tool ★★★
CrowdStrike.webp 2023-02-23 00:10:37 Mitigate Cyber Risk From Email With the Falcon LogScale and Mimecast Integration (lien direct) Email is the top initial attack vector, with phishing campaigns responsible for many damaging cyber attacks, including ransomware. Being able to search Mimecast email security logs in CrowdStrike Falcon® LogScale (formerly known as Humio), alongside other log sources such as endpoint, network and authentication data helps cybersecurity teams detect and respond to cyber attacks. This […] ★★★
CrowdStrike.webp 2023-02-17 07:45:42 3 Ways Visualization Improves Cloud Asset Management and Security (lien direct) Public cloud services and cloud assets are agile and dynamic environments. Close oversight of these assets is a critical component of your asset management and security practices. While it's important to understand the relationships and potential vulnerabilities of your cloud assets, the practice of managing these systems is complicated by the ever-changing nature of cloud […] Cloud ★★★
CrowdStrike.webp 2023-02-16 07:45:53 CrowdStrike Ranked #1 in the IDC Worldwide Endpoint Security Market Shares Report for Third Time in a Row (lien direct) CrowdStrike maintains endpoint security market leadership with a #1 ranking in IDC's 2021-2022 report, and has been awarded Best Endpoint Detection and Response and Best Product Development by SE Labs. These recognitions validate CrowdStrike as the industry's market and innovation leader in endpoint security. We're honored to share CrowdStrike has been ranked #1 out of […] Guideline ★★★
CrowdStrike.webp 2023-02-15 16:15:46 February 2023 Patch Tuesday: 9 Critical CVEs, and 3 Zero Days Being Actively Exploited in the Wild (lien direct) Microsoft has released 75 security patches for its February 2023 Patch Tuesday rollout: 9 vulnerabilities are rated Critical, and the remaining 66 are rated Important.  Three actively exploited vulnerabilities were reported by the vendor: an elevation of privilege within Windows Common Log File System Driver (CVE-2023-23376), a security feature bypass in Microsoft Office (CVE-2023-21715), and […] ★★★
CrowdStrike.webp 2023-02-13 15:01:35 DLL Side-Loading: How to Combat Threat Actor Evasion Techniques (lien direct) Threat actors constantly evolve their tactics and techniques to circumvent security solutions. Working at the cutting-edge of detection engineering, CrowdStrike rapidly tracks and observes these evolutions in tactics to deliver timely, effective detections that protect customers. In this blog, we explore DLL side-loading and learn how CrowdStrike has expanded protections with Advanced Memory Scanning. Learn […] Threat ★★
CrowdStrike.webp 2023-02-07 19:53:40 Make Compliance a Breeze with Modern Log Management (lien direct) From manufacturers in Michigan to fintechs in Finland, every business must comply with industry regulations - which are increasingly constraining. At the same time, businesses must protect and account for a growing number of systems, applications and data in order to remain compliant.  In other words, compliance is getting harder. Enter log management. While regulations […] ★★
CrowdStrike.webp 2023-02-01 21:34:45 Using Artificial Intelligence and Machine Learning to Combat Hands-on-Keyboard Cybersecurity Attacks (lien direct) Malware gets the headlines, but the bigger threat is hands-on-keyboard adversary activity which can evade traditional security solutions and present detection challenges Machine learning (ML) can predict and proactively protect against emerging threats by using behavioral event data. CrowdStrike's artificial intelligence (AI)-powered indicators of attack (IOAs) use ML to detect and predict adversarial patterns in […] Malware Threat Prediction ★★★
CrowdStrike.webp 2023-02-01 08:48:42 CrowdStrike Announces Expanded Service Integrations with AWS (lien direct) At AWS re:Invent 2022, CrowdStrike announced expanded service integrations with AWS to provide breach protection across your AWS environment, simplified infrastructure management and security consolidation. On January 31, 2023, AWS announced CloudTrail Lake Partner Integrations, with CrowdStrike signing on as a launch partner. With this integration, organizations get the opportunity for a consistent security posture […] ★★★
CrowdStrike.webp 2022-12-15 07:06:59 Unveiling CrowdStrike Falcon Surface: The Industry\'s Most Complete Adversary-Driven External Attack Surface Management (EASM) Technology (lien direct) Resilient cybersecurity posture can only be achieved with a full understanding of your internal and external attack surface. CrowdStrike Falcon® Surface builds on our award-winning adversary intelligence with cutting-edge external attack surface management (EASM) capabilities for a complete picture of known and unknown externally exposed assets, all delivered via the unified CrowdStrike Falcon® platform.  As […] ★★
CrowdStrike.webp 2022-12-14 19:37:51 December 2022 Patch Tuesday: 10 Critical CVEs, One Zero-Day, One Under Active Attack (lien direct) Microsoft has released 49 security patches for its December 2022 Patch Tuesday rollout. Of these, 10 vulnerabilities are rated Critical, two are rated Medium and the rest are rated Important. DirectX Graphics Kernel Elevation of Privilege Vulnerability (CVE-2022-44710) is listed as publicly known while Windows SmartScreen Security Feature Bypass Vulnerability (CVE-2022-44698) is listed as actively […] Vulnerability ★★
CrowdStrike.webp 2022-12-14 17:43:30 Why Managed Threat Hunting Should Top Every CISO\'s Holiday Wish List (lien direct) With the end of the year fast approaching, many of us are looking forward to a well-deserved break. However, security practitioners and security leaders worldwide are bracing themselves for what has become a peak period for novel and disruptive threats.  In 2020, the holiday season was marked by the SUNBURST incident, and in 2021 the […] Threat Guideline Solardwinds ★★
CrowdStrike.webp 2022-12-14 13:58:34 Attackers Set Sights on Active Directory: Understanding Your Identity Exposure (lien direct) Eighty percent of modern attacks are identity-driven. Why would an attacker hack into a system when they can simply use stolen credentials to masquerade as an approved user and log in to the target organization?  Once inside, attackers increasingly target Microsoft Active Directory because it holds the proverbial keys to the kingdom, providing broad access […] Hack ★★
CrowdStrike.webp 2022-12-13 22:29:24 CrowdStrike Services Helps Organizations Prioritize Patching Vulnerabilities with CrowdStrike Falcon Spotlight (lien direct) When the CrowdStrike Services team conducts a proactive security engagement, such as a Cybersecurity Maturity Assessment or Tabletop Exercise, it often uses CrowdStrike Falcon® Spotlight to identify what vulnerabilities exist in the environment. Unfortunately, this can be a disheartening experience, as many organizations we see have millions, even tens of millions, of unpatched vulnerabilities. It's […] Patching ★★
CrowdStrike.webp 2022-12-13 07:16:18 Our Customers Have Spoken: CrowdStrike Delivers the Best in EDR, EPP and XDR (lien direct) Time and again, analyst reports, independent tests and numerous other awards and acknowledgements affirm CrowdStrike is a leader in cybersecurity. Why is this important?  Because when CrowdStrike is #1, it's our customers who win. But to us, the best validation of the power of the CrowdStrike Falcon® platform comes from our customers themselves. We are […] Guideline ★★
CrowdStrike.webp 2022-12-09 19:52:16 Importing Docker Logs with CrowdStrike Falcon LogScale Collector (lien direct) Docker is the primary tool used for containerizing workloads. If your company wants to build containers with quality, then you'll need access to your Docker container logs for debugging, validation and optimization. While engineering teams can view container logs through straightforward CLI tools (think docker logs), these tools don't provide a mechanism for storing or […] Tool ★★
CrowdStrike.webp 2022-12-09 15:15:51 5 Partner Predictions for 2023 from CrowdStrike\'s Channel Chief (lien direct) As vice president of global alliances for CrowdStrike, I have the pleasure of meeting daily and weekly with our partners around the globe to ensure that CrowdStrike is addressing their needs and the needs of their customers with our products and services. As a benefit of talking with our partner ecosystem, I have gained a […] ★★
CrowdStrike.webp 2022-12-09 00:21:38 Integration Exploration: Getting Started with Falcon LogScale and Bucket Storage on AWS S3 (lien direct) If you run CrowdStrike Falcon® LogScale, previously known as Humio, locally or on-premises, one of your first steps is to configure local storage so that LogScale has a persistent data store where it can send logs. If you're running LogScale as a cluster setup, then you'll have some data replication as a function of how […] ★★
CrowdStrike.webp 2022-12-07 22:27:34 Inside the MITRE ATT&CK Evaluation: How CrowdStrike\'s Elite Managed Services Operate in the Real World (lien direct) Following CrowdStrike's strong performance in the first-ever MITRE ATT&CK® Evaluations for Security Managed Services Providers with 99% detection coverage, we take a deep dive into the testing process and how our elite managed services operate in the real world. We recently announced CrowdStrike achieved 99% detection coverage in the inaugural MITRE ATT&CK Evaluations for Security […] ★★★
CrowdStrike.webp 2022-10-25 07:31:05 CrowdStrike Falcon Platform Achieves 100% Ransomware Prevention with Zero False Positives, Wins AAA Enterprise Advanced Security Award from SE Labs (lien direct) The CrowdStrike Falcon® platform achieved 100% protection accuracy and 100% legitimacy accuracy with zero false positives, winning SE Labs' first-ever endpoint detection and response (EDR) ransomware detection and protection test The Falcon platform detected and blocked 100% of ransomware files during testing, which involved both direct attacks with 270 ransomware variations and deep attack tactics, […] Ransomware
CrowdStrike.webp 2022-10-21 20:30:49 CrowdStrike Advances to Research Partner with MITRE Engenuity Center for Threat-Informed Defense to Help Lead the Future of Cyber Defense (lien direct) CrowdStrike is deepening its commitment to advancing the security ecosystem leading the future of protection by becoming a top-tier partner in the MITRE Center for Threat-Informed Defense research program. CrowdStrike's adversary-centric approach and technology leadership can help change the game on adversaries, turning state-of-the-art threat defense into a state of practice. CrowdStrike is now a […] Threat Guideline
CrowdStrike.webp 2022-10-21 11:21:13 Playing Hide-and-Seek with Ransomware, Part 2 (lien direct) In Part 1, we explained what Intel SGX enclaves are and how they benefit ransomware authors. In Part 2, we explore a hypothetical step-by-step implementation and outline the limitations of this method. Watch this live attack demo to see how the CrowdStrike Falcon® platform and the CrowdStrike Falcon Complete™ managed detection and response team protect […] Ransomware
CrowdStrike.webp 2022-10-20 08:33:08 CrowdStrike and Google Chrome: Building an Integrated Ecosystem to Secure Your Enterprise Using the Power of Log Management (lien direct) Organizations today face an onslaught of attacks across devices, identity and cloud workloads. The more security telemetry an organization has to work with, the better threat hunters can contextualize events to find and remediate potential threats. Google recently announced Chrome Enterprise Connectors Framework, a collection of plug-and-play integrations with industry-leading security solution providers. The framework […] Threat Guideline
CrowdStrike.webp 2022-10-19 20:22:29 CrowdStrike\'s Cloud Security and Observability Capabilities to Be Showcased at KubeCon + CloudNativeCon North America 2022 (lien direct) KubeCon + CloudNativeCon North America 2022 is happening next week, and we're excited to showcase our industry leading cloud-native application protection platform (CNAPP) capabilities and observability technology. The conference, Oct. 24-28 in Detroit, will gather adopters, technologists and developers from leading open-source and cloud-native communities around the globe.    CrowdStrike CNAPP Capabilities on Display The CrowdStrike […] Guideline
CrowdStrike.webp 2022-10-18 19:49:21 Why Your Small Business Needs to Rethink Its Cybersecurity Strategy (lien direct) Cybercrime is a big problem for small businesses, and the risk of advanced threats continues to grow. This Cybersecurity Awareness Month, learn how to protect your SMB or nonprofit from attacks that threaten the business.  The cybersecurity threat to small- and medium-sized businesses (SMBs) continues to grow as cybercriminals recognize how vulnerable they can be, […] Threat
CrowdStrike.webp 2022-10-18 17:02:37 Do You Know Who\'s in Your Cloud? Preventing Identity-Based Threats with CIEM (lien direct) As organizations continue to shift to multi-cloud environments and increasingly use cloud services for application development, new challenges emerge that require dramatic changes in the delivery and practice of cybersecurity.  Notably, Gartner predicts that inadequate management of identities, access and privileges will cause 75% of cloud security failures by 2023.1 Though public cloud service providers […]
CrowdStrike.webp 2022-10-14 13:31:07 The Anatomy of Wiper Malware, Part 4: Less Common “Helper” Techniques (lien direct) This is the fourth blog post in a four-part series. Read Part 1 | Part 2 | Part 3. In Part 3, CrowdStrike’s Endpoint Protection Content Research Team covered the finer points of Input/Output Control (IOCTL) usage by various wipers. The fourth and final part of the wiper series covers some of the rarely used […]
CrowdStrike.webp 2022-10-13 20:48:10 October 2022 Patch Tuesday: 13 Critical CVEs, One Actively Exploited Bug, ProxyNotShell Still Unpatched (lien direct) Microsoft has released 84 security patches for its October 2022 Patch Tuesday rollout. Of these, 13 vulnerabilities are rated Critical, while the remaining 71 are rated Important. It should be noted that this month's patching update does not include patches for ProxyNotShell, despite the active exploitation of two related vulnerabilities; CrowdStrike offers recommendations on mitigation […] Patching
CrowdStrike.webp 2022-10-13 13:14:34 CrowdStrike Partners with MITRE CTID to Identify Adversaries Using Cloud Analytics (lien direct) Fourteen key cloud analytics for Azure and GCP cloud environments were identified and mapped as indicative of adversary behavior and serve as a blueprint for understanding and writing new cloud analytics. The CrowdStrike Falcon®® platform delivers a powerful combination of agentless capabilities to protect against misconfigurations and control plane attacks, along with agent-based runtime security […]
CrowdStrike.webp 2022-09-14 08:00:00 Coming Soon to Las Vegas: Fal.Con 2022 Event Highlights and Special Guests (lien direct) The countdown continues! As Fal.Con 2022 quickly approaches, we're excited to share more information about the security industry visionaries and notable talks on the agenda for the sixth annual CrowdStrike conference for customers and cybersecurity professionals.  IT and security practitioners must stay a step ahead of adversaries who are constantly evolving their tactics, techniques and […]
CrowdStrike.webp 2022-09-13 20:56:40 2022 Threat Hunting Report: Falcon OverWatch Looks Back to Prepare Defenders for Tomorrow\'s Adversaries (lien direct) Another turbulent year for cybersecurity finds itself right at home alongside global economic headwinds and geopolitical tensions. This year has been defined by rampant affiliate activity, a seemingly endless stream of new vulnerabilities and exploits, and the widespread abuse of valid credentials. These circumstances have conspired to drive a 50% increase in interactive intrusion activity […] Threat
CrowdStrike.webp 2022-09-06 18:52:46 Consolidated Identity Protection in a Unified Security Platform Is a Must-Have for the Modern SOC (lien direct) As cyberattacks continue to grow relentlessly, enterprises have to continue improving their cyber defenses to stay one step ahead of the adversaries. One area that CISOs have recently started paying more attention is identity threat protection. This is not surprising considering 80% of modern attacks are identity-driven leveraging stolen credentials. In fact, identity threat detection […] Threat ★★
CrowdStrike.webp 2022-09-01 14:39:53 Register Now to Join Us in Las Vegas for Fal.Con 2022 (lien direct) The countdown has begun! In less than a month, we'll gather in Las Vegas for Fal.Con 2022, the sixth annual CrowdStrike cybersecurity conference. We're excited to bring you an event packed with product announcements, keynotes from industry visionaries, deep-dive talks, hands-on workshops and training sessions, special guests and more.  The past few years have been […] ★★★
CrowdStrike.webp 2022-09-01 13:20:32 CrowdStrike Introduces Sandbox Scryer: A Free Threat-Hunting Tool for Generating MITRE ATT&CK and Navigator Data (lien direct) Sandbox Scryer is an open-source tool for producing threat hunting and intelligence data from public sandbox detonation output The tool leverages the MITRE ATT&CK Framework to organize and prioritize findings, assisting in assembling indicators of compromise (IOCs), understanding attack movement and hunting threats By allowing researchers to send thousands of samples to a sandbox for […] Tool Threat ★★
CrowdStrike.webp 2022-08-31 12:20:15 Defense Against the Lateral Arts: Detecting and Preventing Impacket\'s Wmiexec (lien direct) Impacket, an open source collection of Python modules for manipulating network protocols, contains several tools for remote service execution, Windows credential dumping, packet sniffing and Kerberos manipulation. CrowdStrike Services has seen an increased use of Impacket's wmiexec module, primarily by ransomware and eCrime groups. Wmiexec leaves behind valuable forensic artifacts that will help defenders detect […] Ransomware
CrowdStrike.webp 2022-08-25 12:37:33 Getting Started Guide: Falcon Long Term Repository (lien direct) Limited data retention resulting from financial or technological constraints makes it hard for security teams to see the complete history of an attack. This lack of full context about a threat - or a potential threat - eventually catches up with organizations, leading to longer dwell times and increased risk of a breach.  CrowdStrike Falcon […] Threat Guideline
CrowdStrike.webp 2022-08-24 13:14:26 The Anatomy of Wiper Malware, Part 2: Third-Party Drivers (lien direct) In Part 1 of this four-part blog series examining wiper malware, we introduced the topic of wipers, reviewed their recent history and presented common adversary techniques that leverage wipers to destroy system data.  In Part 2, CrowdStrike’s Endpoint Protection Content Research Team discusses how threat actors have used legitimate third-party drivers to bypass the visibility […] Threat
CrowdStrike.webp 2022-08-23 12:45:06 GitOps and Shift Left Security: The Changing Landscape of DevSecOps (lien direct) Application developers have always had a tricky balance to maintain between speed and security, two requirements that may often feel at odds with each other. Practices that increase speed also pressure development teams to ensure that vulnerable code is identified and remediated without slowing development. As companies embrace digital transformation initiatives, the need to weave […]
CrowdStrike.webp 2022-08-23 08:23:20 (Déjà vu) Adversary Quest 2022 Walkthrough, Part 3: Four PROTECTIVE PENGUIN Challenges (lien direct) In July 2022, the CrowdStrike Intelligence Advanced Research Team hosted the second edition of our Adversary Quest. As in the previous year, this “capture the flag” event featured 12 information security challenges in three different tracks: eCrime, Hacktivism and Targeted Intrusion. In each track, four consecutive challenges awaited the players, requiring different skills, including reverse […]
CrowdStrike.webp 2022-08-16 13:14:46 Why XDR Should Be on Your Roadmap for SOC Success (lien direct) Fighting modern adversaries requires having a modern security operations center (SOC), especially as organizations move to the cloud. To protect their estates against tomorrow's threats, security professionals have often turned to more data sources and adding more security monitoring tools in their operations, both in the pursuit of maximizing their attack surface visibility and reducing […]
CrowdStrike.webp 2022-08-16 05:00:57 CrowdStrike Wins Technology Innovation Leadership Award, Continues Dominance in Endpoint Security Market (lien direct) CrowdStrike is proud to receive Frost & Sullivan's 2022 Global Technology Innovation Leadership Award in the endpoint security sector. This recognition reflects CrowdStrike's continued investment to drive innovation and deliver more value to its customers through its industry-leading Falcon platform. The global shift to remote work has driven a tremendous increase in internet traffic, the […] Guideline
Last update at: 2024-06-28 21:07:31
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter