Recent Blogs
Unveiling LIMINAL PANDA: A Closer Look at China's Cyber Threats to the Telecom Sector
On Tuesday, November 19, 2024, Adam Meyers, CrowdStrike Senior Vice President of Counter Adversary Operations, will testify in front of the U.S. Senate Judiciary Subcommittee on Privacy, Technology, a[…]
Pegasystems Consolidates Endpoint, Identity and Cloud Security with CrowdStrike
Pegasystems, a global leader in AI-powered decisioning and workflow automation, is a strategic partner for many of the world’s leading brands. The company’s role as an enterprise software provider mea[…]
November 2024 Patch Tuesday: Four Critical and Three Zero-Days Among 158 Vulnerabilities Patched
Microsoft has released security updates for 158 vulnerabilities in its November 2024 Patch Tuesday rollout. Among these are four Critical vulnerabilities (CVE-2024-43625, CVE-2024-49056, CVE-2024-4349[…]
CrowdStrike Launches AI Red Team Services to Secure AI Innovation
As organizations race to adopt generative AI (GenAI) to drive efficiency and innovation, they face a new and urgent security challenge. While AI-driven tools and large language models (LLMs) open vast[…]
CrowdStrike to Acquire Adaptive Shield to Deliver Integrated SaaS Security Posture Management
Today, at the inaugural Fal.Con Europe, I’m excited to announce CrowdStrike’s agreement to acquire SaaS security leader Adaptive Shield. This acquisition will propel CrowdStrike to become the only cyb[…]
CrowdStrike Receives High Scores in 2024 Gartner® Critical Capabilities for Endpoint Protection Platforms Report
This week, Gartner released its 2024 Gartner® Critical Capabilities Report for Endpoint Protection Platforms (EPP) as a companion to last month’s 2024 Gartner® Magic Quadrant™ for Endpoint Protection […]
CrowdStrike Falcon Platform Supports Google Cloud's ARM-Based Axion CPUs
CrowdStrike is proud to announce cloud security support for Google Cloud’s first custom ARM-based processor, Axion, delivered by the unified, cloud-native CrowdStrike Falcon® platform. This extends in[…]
CrowdStrike Research Challenges Containerized Application Predictability Assumptions
General-purpose Linux utilities — often observed in living off the land post-exploitation activity — are frequently used in popular containerized applications. CrowdStrike researchers have identified […]
CrowdStrike Statement on Bloomberg’s October 25, 2024 Story
CrowdStrike believes that Bloomberg’s reporting for its October 25, 2024 story is misleading. CrowdStrike had a bona fide, signed, non-cancellable order placed by Carahsoft under its distribution agre[…]
Protect Your Weakest Link: New Account Linking Capabilities Use AI to Thwart Identity-Based Attacks
As networks become increasingly distributed, user identities are becoming a top adversary target. CrowdStrike’s 2024 Threat Hunting Report and 2024 Global Threat Report state 5 of the top 10 MITRE tac[…]