Category

Security
Today we are proud to announce the CrowdStrike Falcon® Search Engine, the largest and fastest search engine exclusively for cybersecurity professionals. We recognize the transformative effects that search engines have had in other areas of our lives, and now were are bringing those benefits to the security industry. A search engine for cybersecurity means faster...
Read More
NotPetya Technical Analysis Part II Executive Summary This NotPetya technical analysis is a continuation of the previous technical blog (NotPetya Technical Analysis – A Triple Threat: File Encryption, MFT Encryption, Credential Theft) describing the threat of NotPetya, a destructive malware with self-propagation capabilities. After further analysis, CrowdStrike researchers discovered: How the NotPetya DLL loads functions...
Read More
What You Need To Know About Petya Ransomware As many companies regained their footing after last month’s devastating WannaCry outbreak, we saw another ransomware attack yesterday, which, has so far, impacted organizations in more than 65 countries. The ThreatLabZ team detects suspicious code and patterns by analyzing 35 billion transactions a day in the Zscaler...
Read More
Petya Ransomware Outbreak In just a month after the WannaCry outbreak, we are seeing another widespread ransomware outbreak involving possible Petya ransomware family variant. The details on the initial delivery vector are sparse and as expected there is lot of speculation, just like WannaCry during the early hours, but we wanted to share a quick...
Read More
Computer Business Review recently published an interview with CrowdStrike® Chief Scientist Dr. Sven Krasser, “Machine learning in cybersecurity: The first line of defense against modern threats,” in which he explains the important role machine learning plays in defending against today’s most challenging cyber threats. Machine learning (ML) is not a new technology, however, it seems...
Read More
A Look At The Zscaler Cloud Security Platform Bill Lapp, Senior Director of Solution Engineering at Zscaler walks through the challenges IT teams face with BYOD, SaaS, a mobile workforce and other business initiatives in this brief video looking at the Zscaler Cloud Security Platform.   Check out this quick whiteboard session, led by Bill...
Read More
Analysis of WannaCry 2.0 Variants and Propagation Vectors Seen in The Wild An aggressive ransomware campaign WannaCry 2.0 went viral on May 12, 2017, that impacted over 200,000 systems worldwide and the attack remains active. The use of the leaked NSA “ETERNALBLUE” SMB exploit by the dropper payloads, which target a Microsoft Windows vulnerability in the Microsoft Server Message...
Read More
A wonderful serenity has taken possession of my entire soul, like these sweet mornings of spring which I enjoy with my whole heart. I am alone, and feel the charm of existence in this spot, which was created for the bliss of souls like mine. I am so happy, my dear friend, so absorbed in...
Read More
In the aftermath of WannaCry Ransomware, our concept of the network has to change By now, everyone has heard about WannaCry, the ransomware attack that made headlines on Friday May 12th and continues to show up in various forms. In a nutshell, this ransomware has impacted more than 200,000 systems worldwide and its variants are...
Read More
1 3 4 5