Best Endpoint Security Software 2022
Implementing endpoint security best practices is crucially important in times when a remote working culture has become commonplace. Security-conscious organizations realizing the need for high-end and timely cyber protection strive to find a modern Endpoint Detection and Response (EDR) or Extended ... Read more
Zero trust platform integration between CrowdStrike and Cloudflare
CrowdStrike and Cloudflare expand their relationship by integrating a zero-trust platform
CrowdStrike and Cloudflare announced an expansion into their existing relationship. The news is that CrowdStrike will be integrating its Falcon Zero Trust Assessment into Cloudflare zero-trust platform.
... Read more
Major tech companies provide free cybersecurity to US industry
Cloudflare, CrowdStrike and Ping Identity established the joint Critical Infrastructure Defense Project to protect companies in strategic US industries free of charge.
According to Cloudflare, CrowdStrike and Ping Identity, it's imperative for vendors to defend vulnerable industry sectors agains... Read more
CrowdStrike launches Falcon Identity Threat Protection Complete
CrowdStrike introduces Falcon Identity Threat Protection Complete. The managed security service protects organizations against attackers using stolen login credentials, also known as identity-based attacks.
Falcon Identity Threat Protection Complete is an extension of Falcon Identity Threat Prot... Read more
China-based Aquatic Panda hackers actively exploit Log4j
Aquatic Panda, a China-based hacking collective, directly exploited the Log4j vulnerability to attack an undisclosed academic institution. The attack was discovered and parried by CrowdStrike's Overwatch threat-hunting specialists.
According to CrowdStrike, China-based hackers launched an attack... Read more
CrowdStrike acquires cloud-based security provider SecureCircle
CrowdStrike acquires SaaS security services provider SecureCircle. In doing so, CrowdStrike expands its focus on zero trust.
The acquired technology will enable customers to implement data protection and zero trust on a device, identity and data level. Resultingly, end users should have zero tru... Read more
How an undetected hack group tapped telecom data for 5 years straight
According to research by CrowdStrike, the LightBasin hacking group has been trying to directly tap various telecom data from telecom operators worldwide. Attacks took place as early as 2016, continuing to this day.
Targeted data mainly concerns call data, text messages and relevant metadata. The... Read more
New ransomware shows popularity of Golang programming language
A new ransomware strain has emerged that uses Golang in what is yet another sign of the programming language's growing popularity among cybercriminals. CrowdStrike managed to get a sample of the new ransomware variant, which has not yet been named.
It borrows features from HelloKitty/DeathRansom... Read more
Google and CrowdStrike integrations just got enhanced
Google Cloud and CrowdStrike are padding their security service integrations to offer joint enterprise customers more visibility into potential threats aimed at their hybrid cloud deployments while enhancing workload security measures.
The CrowdStrike Falcon platform will be entwined with Google... Read more
Zscaler working with CrowdStrike on securing remote access
Zscaler and Crowdstrike have joined forces to provide better security for users. Together, the companies aim to improve the security of Zscaler's remote access products.
The two companies announced their collaboration in a press release. Companies using Zscaler Private Access (ZPA) will be able ... Read more