Category BLOG Featured Now Live: The CrowdStrike 2026 Financial Services Threat Landscape Report May 14, 2026 Falcon AIDR Detects Threats at the Prompt Layer in Kubernetes AI Applications May 13, 2026 May 2026 Patch Tuesday: 30 Critical Vulnerabilities Among 130 CVEs May 12, 2026 Inside CrowdStrike Automated Leads: A Transformative Approach to Threat Detections May 11, 2026 Recent Video Video Highlights the 4 Key Steps to Successful Incident Response Dec 02, 2019 Helping Non-Security Stakeholders Understand ATT&CK in 10 Minutes or Less [VIDEO] Feb 21, 2019 Analyzing Targeted Intrusions Through the ATT&CK Framework Lens [VIDEO] Jan 22, 2019 Qatar’s Commercial Bank Chooses CrowdStrike Falcon®: A Partnership Based on Trust [VIDEO] Aug 20, 2018 Agentic SOC How Charlotte AI AgentWorks Fuels Security's Agentic Ecosystem 03/25/26 CrowdStrike Services and Agentic MDR Put the Agentic SOC in Reach 03/24/26 4 Ways Businesses Use CrowdStrike Charlotte AI to Transform Security Operations 03/12/26 Inside the Human-AI Feedback Loop Powering CrowdStrike’s Agentic Security 02/10/26 Cloud & Application Security 05/13/26 CrowdStrike Named a Leader in Frost & Sullivan 2026 Radar for Cloud-Native Application Protection Platforms 04/27/26 CrowdStrike Expands Real-Time Cloud Detection and Response to Google Cloud 04/22/26 CrowdStrike Falcon Cloud Security Delivered 264% ROI Through Unified Cloud Protection Threat Hunting & Intel 05/14/26 CrowdStrike Named a Leader in the First-Ever Gartner® Magic Quadrant™ for Cyberthreat Intelligence Technologies 05/06/26 CrowdStrike Launches Falcon OverWatch for Defender 05/05/26 Tune In: The Future of AI-Powered Vulnerability Discovery 05/01/26 Endpoint Security & XDR 05/11/26 CrowdStrike Falcon Platform Achieves 441% ROI in Three Years 04/21/26 Falcon for IT Supports Windows Secure Boot Certificate Lifecycle Management 04/01/26 Enhanced Network Visibility: A Dive into the Falcon macOS Sensor's New Capabilities 03/11/26 Engineering & Tech EMBER2024: Advancing the Training of Cybersecurity ML Models Against Evasive Malware 09/03/25 Falcon Platform Prevents COOKIE SPIDER’s SHAMOS Delivery on macOS 08/20/25 CrowdStrike’s Approach to Better Machine Learning Evaluation Using Strategic Data Splitting 08/11/25 CrowdStrike Researchers Develop Custom XGBoost Objective to Improve ML Model Release Stability 03/20/25 Executive Viewpoint Frontier AI Is Collapsing the Exploit Window.
Here’s How Defenders Must Respond. 04/20/26 Frontier AI for Defenders: CrowdStrike and OpenAI TAC 04/16/26 Anthropic Claude Mythos Preview: The More Capable AI Becomes, the More Security It Needs 04/06/26 The Architecture of Agentic Defense: Inside the Falcon Platform 01/16/26 From The Front Lines CrowdStrike Technical Risk Assessments Reveal Common Exposure Patterns 05/04/26 Introducing the CrowdStrike Shadow AI Visibility Service CrowdStrike Flex for Services Expands Access to Elite Security Expertise From Scanner to Stealer: Inside the trivy-action Supply Chain Compromise 03/20/26 Next-Gen Identity Security Detecting CVE-2026-20929: Kerberos Authentication Relay via CNAME Abuse 03/31/26 CrowdStrike FalconID Brings Phishing-Resistant MFA to Falcon Next-Gen Identity Security 02/26/26 CrowdStrike Named a Customers’ Choice in 2026 Gartner® Peer Insights™ Voice of the Customer for User Authentication 02/12/26 CrowdStrike to Acquire Seraphic to Secure Work in Any Browser 01/13/26 Next-Gen SIEM & Log Management Falcon Next-Gen SIEM Supports Third-Party EDR Tools, Starting with Microsoft Defender 03/23/26 Falcon Next-Gen SIEM Simplifies Onboarding with Sensor-Native Log Collection 03/06/26 Exposing Insider Threats through Data Protection, Identity, and HR Context 02/18/26 How to Scale SOC Automation with Falcon Fusion SOAR 02/11/26 Public Sector CrowdStrike Innovates to Modernize National Security and Protect Critical Systems 03/18/26 Falcon Platform for Government Now Offers Falcon for XIoT to Secure Connected Assets CrowdStrike Achieves FedRAMP® High Authorization 03/19/25 NHS Matures Healthcare Cybersecurity with NCSC’s CAF Assurance Model 03/13/25 Exposure Management 05/12/26 April 2026 Patch Tuesday: Two Zero-Days and Eight Critical Vulnerabilities Among 164 CVEs 04/14/26 How CrowdStrike Is Accelerating Exposure Evaluation as Adversaries Gain Speed 04/05/26 March 2026 Patch Tuesday: Eight Critical Vulnerabilities and Two Publicly Disclosed Among 82 CVEs Patched 03/10/26 Securing AI CrowdStrike Expands ChatGPT Enterprise Integration with Enhanced Audit Logging and Activity Monitoring 04/28/26 New CrowdStrike Innovations Secure AI Agents and Govern Shadow AI Across Endpoints, SaaS, and Cloud Secure Homegrown AI Agents with CrowdStrike Falcon AIDR and NVIDIA NeMo Guardrails 03/19/26 Introducing "AI Unlocked: Decoding Prompt Injection," a New Interactive Challenge Data Security Falcon Data Security Secures Data Wherever It Lives and Moves Falcon Data Protection for Cloud Extends DSPM into Runtime 11/20/25 CrowdStrike Stops GenAI Data Leaks with Unified Data Protection 09/18/25 Q&A: How Mastronardi Produce Secures Innovation with CrowdStrike 02/14/25 Start Free Trial March 31, 2026 Yan Linkov CVE-2026-20929, a vulnerability with a CVSS of 7.5 that was patched in the January 2026 Patch Tuesday update, enables attackers to exploit Kerberos authentication relay through DNS CNAME record abuse.[…] February 26, 2026 Ryan Terry FalconID is now generally available, bringing phishing-resistant MFA to the CrowdStrike Falcon® platform and advancing CrowdStrike’s leadership in identity security.
Adversaries continue to use legiti[…] February 12, 2026 Ryan Terry CrowdStrike has been named a Customers’ Choice in the 2026 Gartner Peer Insights™ “Voice of the Customer for User Authentication” report. For the second consecutive year, CrowdStrike has the highest v[…] January 13, 2026 Michael Sentonas I’m delighted to announce CrowdStrike’s intent to acquire Seraphic, the leader in browser runtime security.
With this acquisition, we will extend the power of the CrowdStrike Falcon® platform into the[…] CrowdStrike to Acquire SGNL to Secure Every Identity in the AI Era January 08, 2026 Michael Sentonas I’m excited to announce CrowdStrike’s agreement to acquire SGNL, a leader in identity-first security. This acquisition will extend CrowdStrike Falcon® Next-Gen Identity Security to deliver continuous,[…] Falcon Shield Evolves with AI Agent Visibility and Falcon Next-Gen SIEM Integration December 08, 2025 Charles Choe Try SaaS security for free: Check out our 15-day trial and experience CrowdStrike Falcon® Shield.
CrowdStrike is introducing two powerful innovations in CrowdStrike Falcon® Shield to stop identity-bas[…] CrowdStrike Named Overall Leader in 2025 KuppingerCole ITDR Leadership Compass November 10, 2025 Ryan Terry CrowdStrike has been named the Overall Leader in the 2025 KuppingerCole Leadership Compass for Identity Threat Detection and Response (ITDR), positioned furthest to the right. This validates our ongoi[…] CrowdStrike Named the Leader in 2025 Frost Radar for SaaS Security Posture Management October 27, 2025 Charles Choe Try SaaS security for free: Check out our 15-day trial and experience CrowdStrike Falcon® Shield.
We're proud to announce that CrowdStrike has been recognized as the Growth and Innovation Leader in th[…] From Domain User to SYSTEM: Analyzing the NTLM LDAP Authentication Bypass Vulnerability (CVE-2025-54918) October 22, 2025 Tom Kahana In September 2025, a critical vulnerability (CVE-2025-54918) was discovered affecting domain controllers running LDAP or LDAPS services. This vulnerability allows attackers to elevate privileges from […] CrowdStrike Advances Next-Gen Identity Security with Three Key Innovations September 18, 2025 Ryan Terry CrowdStrike continues to raise the bar for modern identity protection.
We are excited to announce innovations including phishing-resistant multifactor authentication (MFA), new privileged access capab[…] Falcon Next-Gen Identity Security Unifies Protection Across All Identities and Domains August 14, 2025 Ryan Terry CrowdStrike is excited to announce CrowdStrike Falcon® Next-Gen Identity Security, a new solution built to protect every identity — human, non-human, and AI agent — across on-premises, cloud, and SaaS[…] CrowdStrike Named the Only Leader in GigaOm Radar for SaaS Security Posture Management August 12, 2025 Mitesh Shah CrowdStrike Announces Integration with ChatGPT Enterprise Compliance API August 05, 2025 Yonatan Nachman CrowdStrike is announcing a native integration between CrowdStrike Falcon® Shield SaaS security and the OpenAI ChatGPT Enterprise Compliance API, adding visibility and security posture capabilities fo[…] Inside Mondelēz’s Identity Security Strategy with CrowdStrike July 30, 2025 Ryan Terry Mondelēz International is one of the world’s largest snack companies, with brands like Oreo, Ritz, and Cadbury sold in more than 150 countries.
But behind the scenes, it’s also become a model for mode[…] CrowdStrike Named a Leader and Fast Mover in GigaOm ISPM Radar July 23, 2025 Ryan Terry CrowdStrike has been named a Leader and Fast Mover in the 2025 GigaOm Identity Security Posture Management (ISPM) Radar Report, recognizing the power of CrowdStrike Falcon® Identity Protection to dete[…] CrowdStrike Named a Customers’ Choice in 2025 Gartner® Peer Insights™ Voice of the Customer for User Authentication Report June 04, 2025 Ryan Terry CrowdStrike has been named a Customers’ Choice in the 2025 Gartner Peer Insights™ “Voice of the Customer for User Authentication” report.
We have the most five-star ratings of any vendor evaluated in […] Falcon Identity Protection Innovations Stop Insider Risk, Secure Non-Human Identities, and Lock Down Privileged Access June 03, 2025 Ryan Terry - Kendra Kendall How do you stop identity-based attacks in real time — across both human and non-human identities? CrowdStrike Falcon® Identity Protection now delivers powerful new capabilities to answer that question[…] CrowdStrike Leads in GigaOm Radar for Identity Threat Detection and Response May 22, 2025 Ryan Terry According to GigaOm, CrowdStrike is recognized as the most mature and complete platform in the Identity Threat Detection and Response (ITDR) category.
In the 2025 GigaOm Radar Report for ITDR, we are […] CrowdStrike Falcon Privileged Access Unifies Identity Protection Across Critical Environments April 22, 2025 Ryan Terry CrowdStrike is excited to announce CrowdStrike Falcon Privileged Access, a new offering within CrowdStrike Falcon® Identity Protection that uses high-fidelity risk signals to provide just-in-time acce[…] How Cushman & Wakefield Secures Identities with Falcon Identity Protection April 21, 2025 Ryan Terry For years, Cushman & Wakefield’s security team knew that remote desktop protocol (RDP) access was a potential weak point, but enforcing multifactor authentication (MFA) for RDP was out of reach.
The c[…] How to Navigate the 2025 Identity Threat Landscape March 31, 2025 Ryan Terry - Kendra Kendall Identity is at the center of the fight against adversaries. As threat actors weaponize legitimate credentials and sell access to the highest bidders, organizations must proactively detect and secure e[…] How Three Industry Leaders Are Stopping Identity-Based Attacks with CrowdStrike March 07, 2025 Ryan Terry The CrowdStrike 2025 Global Threat Report highlights the ongoing threat of identity-based attacks.
Adversaries are increasingly exploiting stolen credentials to evade detection, and 79% of detections […] CrowdStrike Extends Real-Time Protection for Microsoft Entra ID to Take on Identity-Based Attacks February 26, 2025 Ryan Terry - Kendra Kendall CrowdStrike is excited to announce the general availability of CrowdStrike Falcon® Identity Protection for Microsoft Entra ID, unifying prevention, detection and response to identity-based attacks acr[…] Caught in the Act: CrowdStrike’s New ML-Powered LDAP Reconnaissance Detections February 04, 2025 Shaefer Drew - Mickey Brautbar - Yaron Zinar Early in the cyberattack kill chain, reconnaissance enables attackers to assemble critical network information to plan a tailored attack strategy.
In this phase, adversaries aim to map out networks an[…] Leveraging CrowdStrike Falcon Against Attacks Targeting Okta Environments January 21, 2025 Tony Gore - Justin Schoenfeld As more organizations move to software-as-a-service (SaaS), remote access to applications and data is concentrated among a smaller set of identity providers. These identity providers, such as Okta, mu[…] CrowdStrike Falcon Identity Protection Delivered $1.26M in Total Benefits Over Three Years January 16, 2025 Ryan Terry Identity-based attacks are surging across today’s threat landscape as adversaries target identities in on-premises, cloud and SaaS applications.
They aren’t breaking in — they’re logging in. Organizat[…] Adaptive Shield, a CrowdStrike Company, Leads in 2024 Frost Radar SSPM Leadership Report December 09, 2024 Arye Zacks - Hananel Livneh The Rise of Cross-Domain Attacks Demands a Unified Defense December 04, 2024 Dana Larson Modern adversaries are quiet. No longer reliant on clunky malware to breach their targets, they have adopted more subtle and effective methods to infiltrate businesses, move laterally and access criti[…] CrowdStrike Announces Falcon Identity Protection for AWS IAM Identity Center December 04, 2024 Ryan Terry - Vlad Barytskyy - Kendra Kendall As organizations scale their operations on Amazon Web Services (AWS), they must secure their identities and ensure all users have the correct permissions.
AWS IAM Identity Center is built to simplify […] CrowdStrike Enhances Active Directory Auditing in Falcon Identity Protection December 02, 2024 Ryan Terry - Kendra Kendall - Vlad Barytskyy Identity is the new battleground in today’s rapidly evolving cyber threat landscape. Microsoft Active Directory (AD), a cornerstone of enterprise identity management, is a frequent target for attacker[…] Pegasystems Consolidates Endpoint, Identity and Cloud Security with CrowdStrike November 13, 2024 Venu Shastri Pegasystems, a global leader in AI-powered decisioning and workflow automation, is a strategic partner for many of the world’s leading brands.
The company’s role as an enterprise software provider mea[…] Protect Your Weakest Link: New Account Linking Capabilities Use AI to Thwart Identity-Based Attacks October 24, 2024 Mickey Brautbar - Brenden Bishop - Lucia Stanham As networks become increasingly distributed, user identities are becoming a top adversary target. CrowdStrike’s 2024 Threat Hunting Report and 2024 Global Threat Report state 5 of the top 10 MITRE tac[…] CrowdStrike Announces Falcon Identity Protection Innovations for Entra ID and Privileged Access September 17, 2024 Ryan Terry - Ross Penny In the critical and constantly evolving identity security space, organizations are focused on three essential needs: Understanding identity posture: Visualizing and prioritizing risks associated with […] Elevating Identity Security at Fal.Con 2024 September 11, 2024 Venu Shastri This blog is part of a five-part series previewing Fal.Con 2024 content.
Read previews for cloud, AI and next-gen SIEM. In today’s threat landscape, identity is a primary adversary target and plays a […] CrowdStrike Brings Industry-Leading ITDR to All Major Cloud-Based Identity Providers May 28, 2024 Venu Shastri Today, we’re announcing new capabilities of CrowdStrike Falcon® Identity Protection to further strengthen our industry-leading identity threat detection and response (ITDR) technology and help custome[…] CrowdStrike Named Overall Leader in Industry’s First ITDR Comparative Report April 30, 2024 Venu Shastri The industry’s first identity detection and response (ITDR) analyst report names CrowdStrike an Overall Leader and a “cyber industry force.” In KuppingerCole Leadership Compass, Identity Threat Detect[…] CrowdStrike Extends Identity Security Capabilities to Stop Attacks in the Cloud April 10, 2024 Venu Shastri Two recent Microsoft breaches underscore the growing problem of cloud identity attacks and why it's critical to stop them.
While Microsoft Active Directory (AD) remains a prime target for attackers, c[…] Falcon Fund in Focus: Aembit Strengthens Security for Workload-to-Workload Access January 30, 2024 Gur Talpaz - Aparna Sharma The rise of distributed cloud services and the omnipresence of APIs has caused cloud-native application architecture to become highly fragmented. Enforcing secure access is a critical step in strength[…] Identity Threat Hunting: How CrowdStrike Counter Adversary Operations Is Leading the Charge December 11, 2023 Thuy Nguyen It's 10:30 p.m. and you're heading to bed.
Unfortunately, a threat actor has your organization in their crosshairs. While you’re brushing your teeth, they’re crafting a social engineering email to pil[…] Endpoint and Identity Security: A Critical Combination to Stop Modern Attacks November 17, 2023 Venu Shastri Today’s adversaries increasingly use compromised credentials to breach target environments, move laterally and cause damage. When attackers are logging in — not breaking in — legacy endpoint security […] Adversaries Can “Log In with Microsoft” through the nOAuth Azure Active Directory Vulnerability July 14, 2023 Ross Penny On June 20, 2023, Descope published research detailing how a combination of a flaw in Azure Active Directory and poorly integrated third-party applications — dubbed “nOAuth” — could lead to full accou[…] Relentless Threat Activity Puts Identities in the Crosshairs May 01, 2023 Venu Shastri One set of valid employee credentials can provide an adversary with all they need to log into a business, move laterally, escalate privileges and achieve their goals — whether that’s removing access t[…] CrowdStrike Extends Identity Security Innovations to Protect Customers and Stop Breaches March 20, 2023 Narendran Vaideeswaran From the CISO perspective, identity security is one of the top security challenges, driven by the adversary’s increased use of stolen credentials to target and infiltrate organizations.
The data bears[…] Attackers Set Sights on Active Directory: Understanding Your Identity Exposure December 14, 2022 Venu Shastri Eighty percent of modern attacks are identity-driven. Why would an attacker hack into a system when they can simply use stolen credentials to masquerade as an approved user and log in to the target or[…] 9 Ways a CISO Uses CrowdStrike for Identity Threat Protection December 07, 2022 Tina Thorstenson Identity isn’t a security problem — it’s the security problem.
This was the takeaway from my recent meeting with a local government CISO in the Washington, D.C. area. Tasked with protecting infrastruc[…] CrowdStrike at Oktane22: Celebrating Our Best-in-Class Partnership and Empowering Customers to Secure Identities November 08, 2022 Geoff Swaine We’re proud to announce that CrowdStrike was awarded Okta's Workforce Identity Cloud Technology Partner of the Year Award today at the start of Oktane22.
The award is a testament to the durability of […] Consolidated Identity Protection in a Unified Security Platform Is a Must-Have for the Modern SOC September 06, 2022 Venu Shastri As cyberattacks continue to grow relentlessly, enterprises have to continue improving their cyber defenses to stay one step ahead of the adversaries. One area that CISOs have recently started paying m[…] Detecting and Mitigating NTLM Relay Attacks Targeting Microsoft Domain Controllers June 30, 2022 Marina Simakov Adversaries often exploit legacy protocols like Windows NTLM that unfortunately remain widely deployed despite known vulnerabilities.
Previous CrowdStrike blog posts have covered critical vulnerabilit[…] Falcon Platform Identity Protection Shuts Down MITRE ATT&CK Adversaries April 07, 2022 Joel Spurlock - Liviu Arsene “We were asked to disable identity protection capabilities to let the testing proceed — and still achieved 100% prevention.” The weeks following the release of the MITRE Engenuity ATT&CK Evaluation ca[…] Buying IAM and Identity Security from the Same Vendor?
Think Again. March 11, 2022 Venu Shastri With the growing risk of identity-driven breaches, as seen in recent ransomware and supply chain attacks, businesses are starting to appreciate the need for identity security. As they assess how best […] The Easy Solution for Stopping Modern Attacks March 07, 2022 Kapil Raina Modern cyberattacks are multifaceted, leveraging different tools and techniques and targeting multiple entry points.
As noted in the CrowdStrike 2022 Global Threat Report, 62% of modern attacks do not[…] How a Strong Identity Protection Strategy Can Accelerate Your Cyber Insurance Initiatives March 02, 2022 Narendran Vaideeswaran The growth in frequency and severity of cyberattacks has caused organizations to rethink their security strategies. Major recent security threats, such as high-profile ransomware attacks and the Log4S[…] Reinventing Managed Detection and Response (MDR) with Identity Threat Protection March 02, 2022 Austin Murphy The modern threat landscape continues to evolve with an increase in attacks leveraging compromised credentials.
An attacker with compromised credentials too frequently has free rein to move about an o[…] noPac Exploit: Latest Microsoft AD Flaw May Lead to Total Domain Compromise in Seconds January 11, 2022 Alex Talyanski What Happened? Microsoft recently published two critical CVEs related to Active Directory (CVE-2021-42278 and CVE-2021-42287), which when combined by a malicious actor could lead to privilege escalati[…] Microsoft Active Directory Supply Chain Compromise Reflects Shifting Adversary Tactics to Exploit Identity November 01, 2021 Kapil Raina Microsoft is having a bad month year.
The industry has faced a crisis of trust with numerous challenges over the past year in securing Active Directory (AD), the IT foundation of most organizations. T[…] Security Advisory: MSRPC Printer Spooler Relay (CVE-2021-1678) January 22, 2021 Eyal Karni and Alex Ionescu On Patch Tuesday, January 12, 2021, Microsoft released a patch for CVE-2021-1678, an important vulnerability discovered by CrowdStrike® researchers.
This vulnerability allows an attacker to relay NTLM[…] Six Tips for Securing Privileged Accounts in the Enterprise January 13, 2021 Identity Protection Team This blog was originally published on March 2, 2018. Protecting privileged accounts and actively responding to any potential compromises has become a critical initiative for many CISOs. Stolen credent[…] Your Session Key Is My Session Key: How to Retrieve the Session Key for Any Authentication January 13, 2021 Marina Simakov This blog was originally published on June 11, 2019.
As announced in our recent security advisory, Preempt (now CrowdStrike) researchers discovered a critical vulnerability that allows attackers to re[…] How to Easily Bypass EPA to Compromise Any Web Server that Supports Windows Integrated Authentication January 12, 2021 Yaron Zinar This blog was originally published on June 11, 2019. Researchers from Preempt (now CrowdStrike), have discovered how to bypass the Enhanced Protection for Authentication (EPA) mechanism to successfull[…] Critical Vulnerabilities in NTLM Allow Remote Code Execution and Cloud Resources Compromise December 21, 2020 Yaron Zinar This blog was originally published on June 11, 2019.
On June 2019 Patch Tuesday, Microsoft released patches for CVE-2019-1040 and CVE-2019-1019, two vulnerabilities discovered by Preempt (now CrowdStr[…] Critical Vulnerability in CredSSP Allows Remote Code Execution on Servers Through MS-RDP This blog was originally published on March 13, 2018. On March Patch Tuesday, Microsoft released a patch for CVE-2018-0886, a vulnerability discovered by Preempt (now CrowdStrike) researchers.
The vul[…] Zerologon (CVE-2020-1472): An Unauthenticated Privilege Escalation to Full Domain Privileges December 16, 2020 Marina Simakov and Yaron Zinar This blog was originally published on September 18, 2020. On August 11, 2020 Microsoft released a security update including a patch for a critical vulnerability in the NETLOGON protocol (CVE-2020-1472[…] Active Directory Open to More NTLM Attacks: Drop The MIC 2 (CVE 2019-1166) and Exploiting LMv2 Clients (CVE-2019-1338) This blog was originally published on October 8, 2019.
On October 8, 2019, aka Patch Tuesday, Microsoft released patches for CVE 2019-1166 and CVE-2019-1338 — two important vulnerabilities discovered […] Red Flag Alert: Service Accounts Performing Interactive Logins December 16, 2020 Identity Protection Team This blog was originally published on August 29, 2019. In the world of identity and access security, experts focus on end-user accounts as the weak vector most vulnerable to attackers.
On the contrary[…] Integer Overflow in Active Directory (CVE-2020-1267) December 16, 2020 Yaron Zinar This blog was originally published on July 14, 2020. On July 14, 2020 Patch Tuesday, Microsoft released a patch for CVE-2020-1267, an important vulnerability in the Active Directory (AD) identity stor[…] Maze Ransomware Analysis and Protection December 15, 2020 Yaron Zinar This blog was originally published on May 15, 2020.
Maze ransomware is a malware targeting organizations worldwide across many industries. It is believed that Maze operates via an affiliated network w[…] From the Archives: Drop the MIC — CVE-2019-1040 December 15, 2020 Marina Simakov This blog was originally published on June 11, 2019. As announced in our recent security advisory on CVE-2019-1040, Preempt (now CrowdStrike) researchers discovered how to bypass the MIC (Message Inte[…] Catching BloodHound Before It Bites December 15, 2020 Identity Protection Team This blog was originally published on August 6, 2020.
BloodHound is a public and freely available attack path discovery tool which uses graph theory to map the relationships in an Active Directory (AD[…] Categories CONNECT WITH US FEATURED ARTICLES May 06, 2026 May 05, 2026 SUBSCRIBE Sign up now to receive the latest notifications and updates from CrowdStrike. Sign Up See CrowdStrike Falcon ® in Action Detect, prevent, and respond to attacks— even malware-free intrusions—at any stage, with next-generation endpoint protection.
See Demo Privacy Request Info Contact Us 1.888.512.8906 Accessibility