Tag: crowdstrike
-
Top cybersecurity M&A deals for 2025
Tags: 5G, access, ai, api, apple, application-security, attack, automation, awareness, banking, breach, business, ceo, cisco, cloud, compliance, control, crowdstrike, cyber, cybersecurity, data, ddos, defense, detection, edr, email, endpoint, finance, firewall, gitlab, government, group, ibm, identity, incident response, infrastructure, intelligence, leak, microsoft, mitigation, network, password, programming, risk, risk-management, saas, service, software, sophos, strategy, supply-chain, technology, threat, tool, training, vulnerability, waf, zero-trustPalo Alto Networks to buy CyberArk for $25B as identity security takes center stage July 30, 2025: Palo Alto Networks is making what could be its biggest bet yet by agreeing to buy Israeli identity security company CyberArk for around $25 billion. “We envision Identity Security becoming the next major pillar of our multi-platform strategy, complementing our leadership…
-
Threat Actors Exploit AI to Scale Attacks and Target Autonomous Agents
Adversaries are using artificial intelligence (AI) to increase their operational efficiency in a fast-changing threat landscape. They are scaling attacks and focusing on autonomous AI agents that support contemporary enterprise ecosystems. According to frontline intelligence from CrowdStrike’s 2025 Threat Hunting Report, derived from elite threat hunters and analysts, threat actors are employing generative AI (GenAI)…
-
Threat Actors Increasingly Leaning on GenAI Tools
From eCrime actors to fake IT tech workers, CrowdStrike researchers found that adversaries are using AI to enhance their offensive cyber operations. First seen on darkreading.com Jump to article: www.darkreading.com/remote-workforce/threat-actors-leaning-genai-tools
-
AI is helping hackers automate and customize cyberattacks
CrowdStrike’s annual cyber-threat-hunting report reveals the double threat that AI poses to many businesses. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/ai-automate-cyber-threats-crowdstrike/756694/
-
Agentic AI a target-rich zone for cyber attackers in 2025
At Black Hat USA 2025, CrowdStrike warns that cyber criminals and nation-states are weaponising GenAI to scale attacks and target AI agents, turning autonomous systems against their makers First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366628359/Agentic-AI-a-target-rich-zone-for-cyber-attackers-in-2025
-
Five Things To Know From CrowdStrike’s 2025 Threat Hunting Report
Attackers have put increased efforts behind compromising multiple IT domains at targeted victims as part of utilizing stealthier tactics, according to CrowdStrike’s latest threat hunting report released Monday. First seen on crn.com Jump to article: www.crn.com/news/security/2025/five-things-to-know-from-crowdstrike-s-2025-threat-hunting-report
-
North Korean spies posing as remote workers have infiltrated hundreds of companies, says CrowdStrike
North Korean IT workers are increasingly using generative AI to draft resumes and “deepfake” their appearances to make money for North Korea’s sanctioned nuclear weapons program. First seen on techcrunch.com Jump to article: techcrunch.com/2025/08/04/north-korean-spies-posing-as-remote-workers-have-infiltrated-hundreds-of-companies-says-crowdstrike/
-
#BHUSA: Cloud Intrusions Skyrocket in 2025
CrowdStrike revealed the surge in cloud intrusions was partly driven by a 40% increase in Chinese-state actors exploiting these environments First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/cloud-intrusions-skyrocket/
-
CrowdStrike investigated 320 North Korean IT worker cases in the past year
Threat hunters saw North Korean operatives almost daily, reflecting a 220% year-over-year increase in activity, CrowdStrike said in a new report. First seen on cyberscoop.com Jump to article: cyberscoop.com/crowdstrike-north-korean-operatives/
-
Black Hat 2025: Latest news and insights
Tags: access, ai, api, attack, ciso, cloud, conference, crowdstrike, cvss, cyber, cybersecurity, data, defense, email, exploit, finance, firmware, flaw, group, hacker, hacking, identity, Internet, LLM, malicious, malware, reverse-engineering, sap, service, threat, tool, training, update, usa, vulnerability, windowsBlack Hat USAAugust 2-7, 2025Las Vegas, NVBlack Hat USA 2025 returns to the Mandalay Bay Convention Center in Las Vegas on August 2-7. The annual event is a perennial magnet for cybersecurity professionals, researchers, vendors and othersThe week kicks off on August 2 with four days of cybersecurity training courses. The courses cover a range…
-
Wie EDR EDR aushebelt
Tags: access, cisco, crowdstrike, cyberattack, detection, edr, endpoint, firewall, monitoring, software, tool, vulnerabilityLegitime Security-Tools gegeneinander auszuspielen, eröffnet Cyberkriminellen diverse Vorteile.Cybersicherheitsforscher haben einen unheilvollen neuen Angriffsvektor entdeckt. Dabei könnten Angreifer kostenlose Testversionen von Endpoint Detection and Response (EDR)-Software dazu missbrauchen, vorhandene Sicherheits-Tools zu deaktivieren. Die Researcher Ezra Woods und Mike Manrod haben das Phänomen entdeckt und dokumentiert, das sie als “EDR-on-EDR Violence” bezeichnen. Ihre Erkenntnisse haben die Sicherheitsexperten…
-
The CrowdStrike Outage Was Bad, but It Could Have Been Worse
A year after the largest outage in IT history, organizations need to make an active effort to diversify their technology and software vendors and create a more resilient cyber ecosystem moving forward. First seen on darkreading.com Jump to article: www.darkreading.com/vulnerabilities-threats/crowdstrike-outage-was-bad-could-have-been-worse
-
Is AI here to take or redefine your cybersecurity role?
Tags: ai, attack, automation, business, ceo, cloud, compliance, conference, control, crowdstrike, cyber, cybersecurity, data, governance, intelligence, jobs, monitoring, phishing, risk, skills, soc, software, strategy, technology, threat, training, vulnerability“AI is coming, and will take some jobs, but no need to worry.”That headline ran atop a CSO story published in 2016. Nine years later, the prediction feels closer to coming true, with questions around jobs being replaced or redefined and whether cybersecurity pros should be worried taking on greater nuance, and still hanging in…
-
At Least 750 US Hospitals Faced Disruptions During Last Year’s CrowdStrike Outage, Study Finds
Of those, more than 200 appear to have had outages of services related to patient care following CrowdStrike’s disastrous crash, researchers have revealed. First seen on wired.com Jump to article: www.wired.com/story/at-least-750-us-hospitals-faced-disruptions-during-last-years-crowdstrike-outage-study-finds/
-
Crowdstrike-Ausfall vom 19. Juli 2024: Eileen Haggerty erörtert Erkenntnisse
Tags: crowdstrikeFirst seen on datensicherheit.de Jump to article: www.datensicherheit.de/crowdstrike-ausfall-19-juli-2024-eileen-haggerty-erkenntnisse
-
CrowdStrike CEO: Resilience Efforts, ‘Incredible Partners’ Key To Rebound Over Past Year
CrowdStrike has emerged from the global IT outage caused by a faulty update as a “stronger company” thanks to extensive work to boost the resilience of its cybersecurity platform along with the efforts of its “incredible partners,” CrowdStrike CEO George Kurtz wrote in LinkedIn post. First seen on crn.com Jump to article: www.crn.com/news/security/2025/crowdstrike-ceo-resilience-efforts-incredible-partners-key-to-rebound-over-past-year
-
US Treasury Department sanctions individuals and entities over illegal IT worker scheme
How not to hire a North Korean IT spy (Apr 14, 2025)North Korean group infiltrated 100-plus companies with imposter IT pros: CrowdStrike report (Aug 6, 2024)North Korean hackers impersonated recruiters to steal credentials from over 1,500 developer systems (Jan 30, 2025)> First seen on csoonline.com Jump to article: www.csoonline.com/article/4019820/us-treasury-department-sanctions-individuals-and-entities-over-illegal-it-worker-scheme.html
-
AMD discloses new CPU flaws that can enable data leaks via timing attacks
Tags: access, attack, crowdstrike, cve, cvss, data, exploit, firmware, flaw, guide, leak, malware, microsoft, mitigation, risk, side-channel, strategy, supply-chain, threat, update, vulnerability, windowsCrowdStrike elevates threat classification despite CVSS scores: While AMD rates the vulnerabilities as medium and low severity based on attack complexity requirements, CrowdStrike has independently classified them as critical enterprise threats. The security firm specifically flagged CVE-2025-36350 and CVE-2025-36357 as “Critical information disclosure vulnerabilities in AMD processors,” despite both carrying CVSS scores of just 5.6.According…
-
How To Automate Ticket Creation, Device Identification and Threat Triage With Tines
Run by the team at workflow orchestration and AI platform Tines, the Tines library features over 1,000 pre-built workflows shared by security practitioners from across the community – all free to import and deploy through the platform’s Community Edition.A recent standout is a workflow that handles malware alerts with CrowdStrike, Oomnitza, GitHub, and PagerDuty. Developed…
-
CrowdStrike Remains Cybersecurity ‘Gold Standard:’ Analyst
A prominent Wall Street analyst says CrowdStrike is seeing ‘increased momentum’ in its business, suggesting the cybersecurity giant has moved well beyond the global outage of a year ago. First seen on crn.com Jump to article: www.crn.com/news/security/2025/crowdstrike-remains-cybersecurity-gold-standard-analyst
-
Microsoft sperrt Virenscanner vom Kernelzugriff aus eine Mogelpackung?
Ende Juni 2025 gab es Meldungen (habe ich jedenfalls so interpretiert), dass Virenscanner in “Bälde” nicht mehr den Kernelmode von Windows verwenden dürfen. Der CrowdStrike-Fall, der Millionen Windows-Systeme lahm legte, war laut Microsoft die endgültige Warnung, den Schritt einzuleiten. Die … First seen on borncity.com Jump to article: www.borncity.com/blog/2025/07/03/microsoft-sperrt-virenscanner-vom-kernelzugriff-aus-ein-mogelpackung/
-
Microsoft sperrt Virenscanner vom Kernelzugriff aus ein Mogelpackung?
Ende Juni 2025 gab es Meldungen (habe ich jedenfalls so interpretiert), dass Virenscanner in “Bälde” nicht mehr den Kernelmode von Windows verwenden dürfen. Der CrowdStrike-Fall, der Millionen Windows-Systeme lahm legte, war laut Microsoft die endgültige Warnung, den Schritt einzuleiten. Die … First seen on borncity.com Jump to article: www.borncity.com/blog/2025/07/03/microsoft-sperrt-virenscanner-vom-kernelzugriff-aus-ein-mogelpackung/
-
Scattered Spider Tactics Include Data Theft, Extortion: CrowdStrike
Threat researchers from CrowdStrike are pointing to Scattered Spider’s focus on more than just traditional ransomware attacks, as experts have separately linked the threat group to a data theft attack against Australian airline Qantas. First seen on crn.com Jump to article: www.crn.com/news/security/2025/scattered-spider-tactics-include-data-theft-extortion-crowdstrike
-
1 Year Later: Lessons Learned From the CrowdStrike Outage
The ever-growing volume of vulnerabilities and threats requires organizations to remain resilient and anti-fragile, that is, to be able to proactively respond to issues and continuously improve. First seen on darkreading.com Jump to article: www.darkreading.com/vulnerabilities-threats/1-year-later-lessons-crowdstrike-outage
-
How Microsoft plans to improve resiliency 1 year after CrowdStrike outage
First seen on scworld.com Jump to article: www.scworld.com/news/how-microsoft-plans-to-improve-resiliency-1-year-after-crowdstrike-outage
-
CISOs must rethink defense playbooks as cybercriminals move faster, smarter
Tags: access, automation, breach, business, cisco, ciso, crowdstrike, cybercrime, cybersecurity, data, defense, finance, incident response, Intruder, okta, ransomware, siem, technology, threatThreat actor containment: Increasingly ‘surgical’ and best with a plan: Even after an intruder has been identified, today’s rapid pace of adversary activity is also straining cybersecurity teams’ ability to contain intruders before they can cause damage.”If I’m a CISO, if I’m responsible for detecting and remediating that incident before it progresses to becoming a…
-
Brave New Kernel: Microsoft Previews Safer Windows Ecosystem
Windows 11 Revamp Means No Kernel Access Required for Third-Party Security Tools Nearly one year after a faulty CrowdStrike software update disrupted 8.5 million Windows hosts, causing global IT chaos, Microsoft is previewing multiple resilience changes to Windows, including enabling third-party endpoint security tools to do their magic without needing kernel-level access. First seen on…
-
Microsoft hints at revoking access to the Windows kernel, eventually
Future kernel access in the balance Microsoft did not agree to an interview on its kernel strategy, but a representative did share with CSO a brief statement about the initial announcement’s intentions.”This is an opportunity for partners to test building their solutions outside the kernel and is not an announcement of future plans for kernel…

