Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
|
2021-12-09 09:00:43 |
CrowdStrikeâs Strategic Counter-Adversarial Research Team (SCAR): Developing the Technology Falcon OverWatch Threat Hunters Need (lien direct) |
As a human-led managed threat hunting service, CrowdStrike Falcon OverWatch™ is built around the best and brightest analysts in the industry who lead the fight against todayâs sophisticated adversaries. But while humans remain the critical ingredient that makes OverWatch so successful, these hunters are also supported by best-in-class technologies that enable them to work at […] |
Threat
Guideline
|
|
★★
|
|
2021-12-09 08:59:37 |
CrowdStrike Falcon and Humio: Leverage All Your FDR Data in One Place (lien direct) |
This blog was originally published Nov. 8, 2021 on humio.com. Humio is a CrowdStrike Company. In 2021, Humio and Crowdstrike joined forces to deliver a truly robust security solution. CrowdStrike delivers the industryâs most comprehensive security solution for protecting endpoints and workloads, processing 1 trillion security-related events per day with its pioneering Threat Graph™ technology. […] |
Threat
|
|
★★
|
|
2021-12-07 20:52:45 |
5 Common Hybrid IT Security Challenges and How to Overcome Them (lien direct) |
Digital transformation has pushed organizations to adopt a hybrid IT approach and has created a mix of on-premises and cloud infrastructure that has to be supported and protected. Unfortunately, while hybrid IT holds significant promise for businesses when it comes to creating efficiencies and speeding the delivery of applications and services, it also introduces a […] |
|
|
★★★
|
|
2021-12-07 09:17:25 |
Critical Hit: How DoppelPaymer Hunts and Kills Windows Processes (lien direct) |
In a July 2019 blog post about DoppelPaymer, Crowdstrike Intelligence reported that ProcessHacker was being hijacked to kill a list of targeted processes and gain access, delivering a âcritical hit.â Although the blog is now a couple of years old, the hijacking technique is interesting enough to dig into its implementation. The hijack occurs when […] |
|
|
★★
|
|
2021-12-07 09:14:21 |
Extend Threat Visibility With Humio\'s Integration With CrowdStrike\'s Indicators of Compromise (IOCs) (lien direct) |
This blog was originally published Oct. 1, 2021 on humio.com. Humio is a CrowdStrike Company. What is an indicator of compromise (IOC)? An indicator of compromise (IOC) is a piece of digital forensics that suggests that an endpoint or network may have been breached. The ability to monitor for indicators of compromise is critical to […] |
Threat
|
|
★★
|
|
2021-12-03 09:00:39 |
End-to-end Testing: How a Modular Testing Model Increases Efficiency and Scalability (lien direct) |
In our last post, Testing Data Flows using Python and Remote Functions, we discussed how organizations can use remote functions in Python to create an end-to-end testing and validation strategy. Here we build on that concept and discuss how it is possible to design the code to be more flexible.  For our purposes, flexible code […] |
|
|
★★★
|
|
2021-12-02 05:16:53 |
Why Actionable Logs Require Sufficient History (lien direct) |
This blog was originally published Oct. 26, 2021 on humio.com. Humio is a CrowdStrike Company. Improve visibility and increase insights by logging everything ITOps, DevOps and SecOps teams need historical log data to ensure the security, performance and availability of IT systems and applications. Detailed historical log data is fundamental for understanding system behavior, mitigating […] |
|
|
★★★★★
|