Recent Blogs
CrowdStrike Falcon Exposure Management Expands Security to Unmanaged Network Assets with Network Vulnerability Assessment
As organizations strengthen endpoint and cloud security, attackers are shifting their focus to often-overlooked network infrastructure like routers, switches, and firewalls. Legacy vulnerability manag[…]
Announcing the CrowdStrike 2025 Global CrowdTour: Bringing the Power of the Crowd to a City Near You
Cybersecurity leaders today face relentless threats — breaches happen in seconds, adversaries constantly evolve, and security teams must adapt faster than ever. CrowdTour 2025 is built for you — the s[…]
CrowdStrike Researchers Develop Custom XGBoost Objective to Improve ML Model Release Stability
Extreme Gradient Boosting (XGBoost) is a valuable tool for training machine learning (ML) classifiers, which often come with the problem of surprise false positives (FPs) and false negatives (FNs). Su[…]
CrowdStrike Achieves FedRAMP® High Authorization
Securing the Nation's Most Critical Systems: CrowdStrike Achieves FedRAMP High Authorization The evolving landscape of state-sponsored threats demands the highest levels of security for federal system[…]
Follow the Adversary: The Top 3 Red Team Exploitation Paths from 2024
Though 2024 may be behind us, many of the security threats and vulnerabilities that organizations faced last year remain. The CrowdStrike Professional Services Red Team tracks them all in its efforts […]
Securing XIoT in the Era of Convergence and Zero Trust
The rise of connected devices has fundamentally reshaped industries, enabling unprecedented levels of automation, efficiency, and innovation. These devices fall under the Extended Internet of Things ([…]
Falcon Cloud Security Identifies AI-Driven Packages in Container Images
Artificial intelligence (AI) is rapidly transforming industries, but with this innovation come new security challenges as threat actors explore AI’s powerful capabilities. They’re adopting new techniq[…]
Build Smarter Threat Detection with Next-Gen SIEM
SOC teams across businesses, industries, and geographies share the same goal: Stop cyberattacks before damage is done. But for those with legacy SIEMs, this is nearly impossible to achieve. Legacy SIE[…]
NHS Matures Healthcare Cybersecurity with NCSC’s CAF Assurance Model
The UK’s National Health Service (NHS) has transformed its approach to validating its level of cybersecurity maturity across healthcare by adopting the National Cyber Security Centre (NCSC) Cyber Asse[…]
4 Key Steps to Prevent Subdomain Takeovers
Adversaries don’t need to force their way in when they can slip through an organization’s overlooked assets. Subdomain takeovers are a prime example of how attackers exploit misconfigured or abandoned[…]