236 |
Venom – A security vulnerability in virtual floppy drive code |
2015-05-13 |
200 |
Preliminary Post Incident Review |
2024-07-24 |
124 |
Technical Details on Today's Outage |
2024-07-20 |
120 |
CrowdStrike Official RCA is now out [pdf] |
2024-08-06 |
118 |
Dealing with Out-of-Memory Conditions in Rust |
2021-08-13 |
105 |
62 Minutes could bring your business down |
2024-07-19 |
87 |
CrowdStrike Incident Preliminary Post Incident Review |
2024-07-24 |
37 |
Russian tracking of Ukrainian Field Artillery Units via Android Malware |
2016-12-23 |
16 |
Technical Details: Falcon Update for Windows Hosts |
2024-07-21 |
11 |
Article on crowdstrike website has not aged well |
2024-07-19 |
11 |
Crowdstrike – Statement on Falcon Content Update for Windows Hosts |
2024-07-19 |
11 |
BitLocker recovery in Microsoft Azure [pdf] |
2024-07-20 |
9 |
3CX softphone compromised by state-level actor in supply chain attack |
2023-03-30 |
8 |
The Current State of Exploit Development: Part 1 |
2020-08-26 |
7 |
I Know What You Did Last Month: A New Artifact of Execution on MacOS 10.13 |
2018-07-25 |
6 |
HTTP iframe Injecting Linux Rootkit |
2012-11-20 |
5 |
CrowdStrike Terms and Conditions 8.6 Disclaimer |
2024-07-20 |
5 |
Linux-Targeted Malware Increases by 35% in 2021 |
2022-01-24 |
5 |
Sunspot: An Implant in the Build Process of SolarWinds Orion |
2021-01-12 |
5 |
Bears in the Midst: Intrusion into the Democratic National Committee |
2016-06-15 |
4 |
Channel File 291 Incident: Root Cause Analysis Is Available |
2024-08-06 |
4 |
CrowdStrike Launches Free Tool to Identify and Help Mitigate Risks in Azure Ad |
2020-12-24 |
4 |
Tech Analysis: Channel File May Contain Null Bytes |
2024-07-25 |
4 |
Cr8escape: Zero-day in CRI-O Container Engine (CVE-2022-0811) |
2022-03-15 |
2 |
What Is Endpoint Detection and Response (EDR)? |
2024-07-20 |
2 |
Active Exploitation Observed for Linux Kernel Privilege Escalation Vulnerabilit |
2024-06-19 |
2 |
Decryptable PartyTicket Ransomware Reportedly Targeting Ukrainian Entities |
2022-03-04 |
2 |
Scheming with URLs: One-Click Attack Surface in Linux Desktop Environments |
2021-11-17 |
2 |
CrowdStrike Adversary Universe |
2021-10-27 |
2 |
Development Cost of Porting TensorFlow Models to Pure Rust |
2021-09-04 |
2 |
Oh No My Data Science Is Getting Rust-Y |
2020-11-12 |
2 |
The Latest on Chinese-Affiliated Intrusions into Commercial Companies |
2015-10-19 |
1 |
Supply chain attack bypassed MFA through theft of Chrome browser cookies |
2022-01-27 |
1 |
Three Best Practices to Effectively Manage Failed Messages |
2021-11-27 |
1 |
TLS/SSL critical vulnerability on iOS/OSX |
2014-02-22 |
1 |
Tortilla: Route all TCP/IP and DNS Traffic Through Tor |
2013-08-07 |
1 |
CrowdStrike to Acquire Adaptive Shield |
2024-11-06 |
1 |
How to Fix the Crowdstrike Issue |
2024-07-19 |
1 |
CrowdStrike to Acquire Flow Security |
2024-03-05 |
1 |
How to Leverage Apple Unified Log (AUL) for IR (2020) |
2023-06-02 |
1 |
UAL Thank Us Later: Leveraging User Access Logging for Forensic Investigations |
2023-01-18 |
1 |
Supply Chain Attack via a Trojanized Comm100 Chat Installer |
2022-10-02 |
1 |
Malicious JavaScript Executions: A Perspective from OverWatch Elite |
2022-06-03 |
1 |
A More Modern Approach to Logging in Go (2022) |
2022-04-04 |
1 |
LightBasin: A Roaming Threat to Telecommunications Companies |
2021-10-19 |
1 |
Analyzing the Security of eBPF Maps |
2021-03-06 |
1 |
CrowdStrike to Acquire Humio |
2021-02-19 |
1 |
Exploiting Privileges via GlobalProtect, Part 1: Windows |
2020-05-10 |
1 |
Saved by the Shell: Reconstructing Command-Line Activity on macOS |
2019-10-03 |
1 |
Enhancing Secure Boot Chain on Fedora 29 |
2019-02-14 |
1 |
Using the Office 365 Activities API to Investigate Business Email Compromises |
2018-07-04 |
1 |
Decrypting NotPetya/Petya thanks to a Salsa20 implementation mistake |
2017-08-24 |
1 |
CrowdStrike Initiates Legal Action Against NSS Labs for Misappropriation of IP |
2017-02-15 |