53 Hacker News submissions for Crowdstrike

HN Points HN Title (Links to submission) Submitted Date
236 Venom – A security vulnerability in virtual floppy drive code 2015-05-13
200 Preliminary Post Incident Review 2024-07-24
124 Technical Details on Today's Outage 2024-07-20
120 CrowdStrike Official RCA is now out [pdf] 2024-08-06
118 Dealing with Out-of-Memory Conditions in Rust 2021-08-13
105 62 Minutes could bring your business down 2024-07-19
87 CrowdStrike Incident Preliminary Post Incident Review 2024-07-24
37 Russian tracking of Ukrainian Field Artillery Units via Android Malware 2016-12-23
16 Technical Details: Falcon Update for Windows Hosts 2024-07-21
11 Article on crowdstrike website has not aged well 2024-07-19
11 Crowdstrike – Statement on Falcon Content Update for Windows Hosts 2024-07-19
11 BitLocker recovery in Microsoft Azure [pdf] 2024-07-20
9 3CX softphone compromised by state-level actor in supply chain attack 2023-03-30
8 The Current State of Exploit Development: Part 1 2020-08-26
7 I Know What You Did Last Month: A New Artifact of Execution on MacOS 10.13 2018-07-25
6 HTTP iframe Injecting Linux Rootkit 2012-11-20
5 CrowdStrike Terms and Conditions 8.6 Disclaimer 2024-07-20
5 Linux-Targeted Malware Increases by 35% in 2021 2022-01-24
5 Sunspot: An Implant in the Build Process of SolarWinds Orion 2021-01-12
5 Bears in the Midst: Intrusion into the Democratic National Committee 2016-06-15
4 Channel File 291 Incident: Root Cause Analysis Is Available 2024-08-06
4 CrowdStrike Launches Free Tool to Identify and Help Mitigate Risks in Azure Ad 2020-12-24
4 Tech Analysis: Channel File May Contain Null Bytes 2024-07-25
4 Cr8escape: Zero-day in CRI-O Container Engine (CVE-2022-0811) 2022-03-15
2 What Is Endpoint Detection and Response (EDR)? 2024-07-20
2 Active Exploitation Observed for Linux Kernel Privilege Escalation Vulnerabilit 2024-06-19
2 Decryptable PartyTicket Ransomware Reportedly Targeting Ukrainian Entities 2022-03-04
2 Scheming with URLs: One-Click Attack Surface in Linux Desktop Environments 2021-11-17
2 CrowdStrike Adversary Universe 2021-10-27
2 Development Cost of Porting TensorFlow Models to Pure Rust 2021-09-04
2 Oh No My Data Science Is Getting Rust-Y 2020-11-12
2 The Latest on Chinese-Affiliated Intrusions into Commercial Companies 2015-10-19
1 Supply chain attack bypassed MFA through theft of Chrome browser cookies 2022-01-27
1 Three Best Practices to Effectively Manage Failed Messages 2021-11-27
1 TLS/SSL critical vulnerability on iOS/OSX 2014-02-22
1 Tortilla: Route all TCP/IP and DNS Traffic Through Tor 2013-08-07
1 CrowdStrike to Acquire Adaptive Shield 2024-11-06
1 How to Fix the Crowdstrike Issue 2024-07-19
1 CrowdStrike to Acquire Flow Security 2024-03-05
1 How to Leverage Apple Unified Log (AUL) for IR (2020) 2023-06-02
1 UAL Thank Us Later: Leveraging User Access Logging for Forensic Investigations 2023-01-18
1 Supply Chain Attack via a Trojanized Comm100 Chat Installer 2022-10-02
1 Malicious JavaScript Executions: A Perspective from OverWatch Elite 2022-06-03
1 A More Modern Approach to Logging in Go (2022) 2022-04-04
1 LightBasin: A Roaming Threat to Telecommunications Companies 2021-10-19
1 Analyzing the Security of eBPF Maps 2021-03-06
1 CrowdStrike to Acquire Humio 2021-02-19
1 Exploiting Privileges via GlobalProtect, Part 1: Windows 2020-05-10
1 Saved by the Shell: Reconstructing Command-Line Activity on macOS 2019-10-03
1 Enhancing Secure Boot Chain on Fedora 29 2019-02-14
1 Using the Office 365 Activities API to Investigate Business Email Compromises 2018-07-04
1 Decrypting NotPetya/Petya thanks to a Salsa20 implementation mistake 2017-08-24
1 CrowdStrike Initiates Legal Action Against NSS Labs for Misappropriation of IP 2017-02-15