From Scanner to Stealer: Inside the trivy-action Supply Chain Compromise
While investigating a spike in script execution detections across several CrowdStrike Falcon® platform customers, CrowdStrike’s Engineering…

While investigating a spike in script execution detections across several CrowdStrike Falcon® platform customers, CrowdStrike’s Engineering…

Security teams are being asked to do more than ever, often with fewer people and less…

Critical Vulnerability in Microsoft Devices Pricing Program CVE-2026-21536 is a Critical remote code execution vulnerability affecting…

Actively Exploited Zero-Day Vulnerability in Windows Remote Desktop CVE-2026-21533 is an Important elevation of privilege vulnerability…

AI is reshaping business at machine speed. From automating claims to improving customer engagement, organizations are…

GenAI data protection for cloud: Identify when sensitive data is transmitted from cloud workloads, services, or…

Most exposure reporting is still slow, error-prone, and disconnected from reality. Analysts spend hours collecting and…

For homegrown models, Falcon Cloud Security surfaces training data, model artifacts, experiment scripts, and package dependencies….

“Microsoft built security controls around identity like conditional access and logs, but this internal impression token…

The WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED! error will stop you dead in your tracks. Despite looking…

Publicly Disclosed Zero-Day Vulnerability in Windows Kerberos CVE-2025-53779 is a Moderate elevation of privilege vulnerability affecting…

The Adversary’s Path to Achieving Persistence Once SCATTERED SPIDER gains access to a target organization, they…

AI is on the agenda in Canberra. In August, the Productivity Commission will release an interim…

Publicly Disclosed Zero-Day Vulnerability in Microsoft SQL Server CVE-2025-49719 is an Important information disclosure vulnerability affecting…

The healthcare sector continues to be a prime target for cyber adversaries, with threat actors constantly…

SCATTERED SPIDER, an eCrime adversary, has recently broadened its target scope to include the aviation sector,…

Managing servers through the command line can be tedious. Many cloud management platforms add to the…

Docker has changed software development and application deployment through containerization. Its intuitive command-line interface, tools such…

Do you ever feel like getting your software to run reliably everywhere is almost as challenging…

Though 2024 may be behind us, many of the security threats and vulnerabilities that organizations faced…

It looked like the final scene of a movie, the denouement of a long adventure in…

CrowdStrike is excited to announce the general availability of CrowdStrike Falcon® Identity Protection for Microsoft Entra…

Sensitive data theft is among adversaries’ most common goals. For defenders, data exfiltration can lead to…

Welcome to RunCloud’s 2024 year in review. First of all, Happy New Year – here’s to 2025!…