CrowdStrike, Inc. is an American cybersecurity technology company based in Sunnyvale, California, and a wholly owned subsidiary of CrowdStrike Holdings, Inc. The company provides endpoint security, threat intelligence, and incident response services to customers in more than 170 countries. The company has been involved in response efforts to several high-profile cyber-attacks, including the Sony Pictures hack, the 2016 Democratic National Committee email leak, and the Democratic National Committee cyber attacks. In the last case it concluded Russian state actors were responsible.

Wikipedia
CrowdStrike
CrowdStrike
Blog Post
  • As demonstrated in the previous blog post about decryption of Petya/NotPetya, almost the complete Master File Table (MFT) can be decrypted. In this post, we describe our approach to collect more keystream bytes, which eventually leads to decrypt the complete… The post Full Decryption of Systems Encrypted by Petya/NotPetya appeared first on .

CrowdStrike
CrowdStrike
Blog Post
  • As demonstrated in the previous blog post about decryption of Petya/NotPetya, almost the complete Master File Table (MFT) can be decrypted. In this post, we describe our approach to collect more keystream bytes, which eventually leads to decrypt the complete… The post Full Decryption of Systems Encrypted by Petya/NotPetya appeared first on .

CrowdStrike
CrowdStrike
Blog Post
  • North Korea is “just a keystroke away” from launching destructive attacks that could cripple the critical infrastructure of countries that oppose its outspoken regime, according to a recent interview with CrowdStrike CTO and Co-Founder Dmitri Alperovitch. The interview in Computer… The post North Korea’s Global Cyberattacks: Potential for Destruction appeared first on .

CrowdStrike
CrowdStrike
Blog Post
  • Since its inception in early 2014, the Russian darknet marketplace xDedic has accumulated a stockpile of over 85,000 hacked servers and PCs, selling access to the highest bidders. Sixty-five percent of these servers belong to U.S.  educational institutions, while many… The post Education and the Darknet: How Hackers Profit from Your Data appeared first on .

CrowdStrike
CrowdStrike
Blog Post
  • On June 27, 2017, a destructive payload dubbed “NotPetya” by researchers, was deployed covertly using a legitimate software package employed by organizations operating in Ukraine. The attack was perpetrated using a mechanism to provide updates distributed by that vendor to… The post Software Supply Chain Attacks on the Rise, Undermining Customer Trust appeared first on .

CrowdStrike
CrowdStrike
YouTube Video
  • Ransomware has become a problem everyone is dealing with. At CrowdStrike we recognize that this attack will continue to be a problem as long as it’s profitable and for that reason CrowdStrike has multiple prevention methods designed to stop this attack from multiple threat vectors. In this video we demonstrate a few of these attack vectors and the different ways CrowdStrike is built to stop them...

CrowdStrike
CrowdStrike
YouTube Video
CrowdStrike
CrowdStrike
Blog Post
  • The term “supply chain attacks” means different things to different people. To the general business community, it refers to attacks targeting vulnerable third-parties in a larger organization’s supply chain. A well-known retail chain’s massive breach in 2013 is a classic… The post Protecting the Software Supply Chain: Deep Insights into the CCleaner Backdoor appeared first on .

CrowdStrike
CrowdStrike
Blog Post
  • The infographic below provides insight into the mindset of today’s IT security professionals, based on new research from the Enterprise Strategy Group (ESG). Learn your peers’ views of the endpoint security market, including the trends that are driving their security strategies;… The post Maximizing Efficacy with Cloud-Delivered Endpoint Security appeared first on .

CrowdStrike
CrowdStrike
Landing Page

New mobile optimized landing page detected

 
CrowdStrike
CrowdStrike
Landing Page

Register for Hunting for Adversary Activity, Finding Evil, Eliminating the Threat

 
CrowdStrike
CrowdStrike
Landing Page

New mobile optimized landing page detected

 
CrowdStrike
CrowdStrike
Landing Page

New mobile optimized landing page detected

 
CrowdStrike
CrowdStrike
Blog Post
  • The Health Insurance Portability and Accountability Act (HIPAA) has big consequences for organizations of all sizes. Companies and institutions that don’t guard employees’ healthcare data may be subject to large fines, patient attrition, brand damage, and lawsuits. For security professionals,… The post HIPAA PHI Getting Tougher to Safeguard but Compliance is Still Critical appeared first on .

CrowdStrike
CrowdStrike
Blog Post
  • “What you don’t know will hurt you.” That’s the topic of a recent SC Magazine article by CrowdStrike CEO George Kurtz, describing the plight of today’s organizations. Faced with an increasing barrage of sophisticated attackers “seeking to compromise a network,… The post Why Cybersecurity Must Be a Board-Level Discussion appeared first on .

CrowdStrike
CrowdStrike
YouTube Video
  • This video highlights the use of a script-based attack and CrowdStrike’s Falcon platform to defend against such attacks. Additional Resources: CrowdStrike Home Page:  https://www.crowdstrike.com Additional demo videos: https://www.crowdstrike.com/tech-center Try it out – free test drive: https://www.crowdstrike.com/test-drive Weekly demo or self-guided tour: https://www.crowdstrike.com/see-demo

CrowdStrike
CrowdStrike
Blog Post
  • Although the frequency and damaging nature of breaches are realities today’s organizations must face, the announcement of what caused the breach often doesn’t come until much later. Typically, the executive leadership of the victim organization publicly blames the sophistication of… The post Effective Cybersecurity Requires a “Hygiene-First” Approach appeared first on .

CrowdStrike
CrowdStrike
Blog Post
  • In a recent webcast, “The Maturing of Endpoint Detection and Response (EDR): Choosing the Right Solution,” Forrester Senior Analyst Chris Sherman and CrowdStrike Senior Director of Product Marketing Con Mallon discussed selecting an effective EDR solution, and how it can… The post The Right Endpoint Detection and Response (EDR) Can Mitigate Silent Failure appeared first on .

CrowdStrike
CrowdStrike
Blog Post
  • Introduction Attacks that forego the use of malware in favor of more subtle techniques like PowerShell and other script based attacks have seen an uptick in popularity.  These attacks often avoid detection by traditional AV solutions.  In an article written by pentestlab.blog… The post How to Block Malicious PowerShell Activity: Bypassing Traditional AV appeared first on .

CrowdStrike
CrowdStrike
Blog Post
  • In a recent webcast, “The Maturing of Endpoint Detection and Response (EDR): Choosing the Right Solution,” Forrester Senior Analyst Chris Sherman and CrowdStrike Director of Product Marketing Con Mallon discussed the important factors organizations must consider in selecting an effective… The post Webcast Offers Critical Factors for Effective Endpoint Detection and Response (EDR) appeared first on...

CrowdStrike
CrowdStrike
Landing Page

New landing page detected.

 
CrowdStrike
CrowdStrike
Blog Post
  • A recent interview with CrowdStrike VP of Product Marketing Dan Larson, for the CyberWire Daily Podcast, focuses on “zero-day” attacks and how organizations can prepare for these stealthy and damaging events. Zero-day refers to attacks that occur when hackers are… The post Address Zero-Day Threats Long Before an Attack Occurs appeared first on .

CrowdStrike
CrowdStrike
Blog Post
  • As security measures get better at detecting and blocking both malware and cyberattacks, adversaries and cybercriminals are forced to constantly develop new techniques to evade detection. One of these advanced techniques involves “fileless” attacks, where no executable file is written… The post How an End-to-End Fileless Attack Unfolds appeared first on .

CrowdStrike
CrowdStrike
YouTube Video
  • OverWatch is a service from CrowdStrike that augments your existing security team with highly trained threat hunters. These threat hunters look for suspicious activity in our customer's organization 24-7 365. Additional Resources: CrowdStrike Home Page: https://www.crowdstrike.com Additional demo videos: https://www.crowdstrike.com/tech-center Try it out – free test drive: https://www.crowdstri...

CrowdStrike
CrowdStrike
Landing Page

New landing page detected.

 
CrowdStrike
CrowdStrike
Landing Page

New landing page detected.

 

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

By signing up, you agree to the Terms of Service and Privacy Policy.

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in

By signing up, you agree to the Terms of Service and Privacy Policy.