Defeating BLOCKADE SPIDER: How CrowdStrike Stops Cross-Domain Attacks
Cross-domain attacks exemplify adversaries’ drive for speed and stealth. In these attacks, threat actors navigate multiple…

Cross-domain attacks exemplify adversaries’ drive for speed and stealth. In these attacks, threat actors navigate multiple…

Anthropic’s Threat Intelligence team recently uncovered and disrupted a sophisticated nation-state operation that weaponized Claude’s agentic…

As a RunCloud user, you already know how to manage high-performance websites and servers efficiently. But…

Coerced Authentication Coerced authentication is a procedure where attackers trigger a remote authentication to a compromised…

Passwords are the keys to our digital lives – think how many times you log in…

Nearly 40,000 vulnerabilities were disclosed in 2024.1 Security teams are overwhelmed, especially those relying on outdated…

CrowdStrike is tracking a mass exploitation campaign almost certainly leveraging a novel zero-day vulnerability — now…

“Microsoft built security controls around identity like conditional access and logs, but this internal impression token…

CrowdStrike continues to raise the bar for modern identity protection. We are excited to announce innovations…

If you’re still sending invoices from Word documents, chasing late payments with awkward follow-up emails, or…

Publicly Disclosed Zero-Day Vulnerability in Windows SMB CVE-2025-55234 is an Important elevation of privilege vulnerability affecting…

Core Technology that Powers Security for AI What follows is a breakdown of the core Falcon…

In mid-August, ShinyHunters posted on Telegram they have been working with known threat actors Scattered Spider…

Publicly Disclosed Zero-Day Vulnerability in Windows Kerberos CVE-2025-53779 is a Moderate elevation of privilege vulnerability affecting…

The Adversary’s Path to Achieving Persistence Once SCATTERED SPIDER gains access to a target organization, they…

Today’s enterprising adversaries are weaponizing AI to scale operations, accelerate attacks, and target the autonomous AI…

Mondelēz International is one of the world’s largest snack companies, with brands like Oreo, Ritz, and…

Container Escape Vectors Container escape allows attackers to break out of container isolation boundaries and access…

Recently, five popular NPM (Node Package Manager) packages were compromised and modified to deliver a malicious…

CrowdStrike has been named a Leader and Fast Mover in the 2025 GigaOm Identity Security Posture…

Publicly Disclosed Zero-Day Vulnerability in Microsoft SQL Server CVE-2025-49719 is an Important information disclosure vulnerability affecting…

The healthcare sector continues to be a prime target for cyber adversaries, with threat actors constantly…

SCATTERED SPIDER, an eCrime adversary, has recently broadened its target scope to include the aviation sector,…

Running an online store means making sure every part of the shopping experience goes smoothly. So…