200 |
Preliminary Post Incident Review |
2024-07-24 |
124 |
Technical Details on Today's Outage |
2024-07-20 |
120 |
CrowdStrike Official RCA is now out [pdf] |
2024-08-06 |
118 |
Dealing with Out-of-Memory Conditions in Rust |
2021-08-13 |
105 |
62 Minutes could bring your business down |
2024-07-19 |
87 |
CrowdStrike Incident Preliminary Post Incident Review |
2024-07-24 |
16 |
Technical Details: Falcon Update for Windows Hosts |
2024-07-21 |
11 |
Article on crowdstrike website has not aged well |
2024-07-19 |
11 |
Crowdstrike – Statement on Falcon Content Update for Windows Hosts |
2024-07-19 |
11 |
BitLocker recovery in Microsoft Azure [pdf] |
2024-07-20 |
9 |
3CX softphone compromised by state-level actor in supply chain attack |
2023-03-30 |
5 |
CrowdStrike Terms and Conditions 8.6 Disclaimer |
2024-07-20 |
5 |
Linux-Targeted Malware Increases by 35% in 2021 |
2022-01-24 |
5 |
Sunspot: An Implant in the Build Process of SolarWinds Orion |
2021-01-12 |
4 |
Channel File 291 Incident: Root Cause Analysis Is Available |
2024-08-06 |
4 |
Tech Analysis: Channel File May Contain Null Bytes |
2024-07-25 |
4 |
Cr8escape: Zero-day in CRI-O Container Engine (CVE-2022-0811) |
2022-03-15 |
2 |
What Is Endpoint Detection and Response (EDR)? |
2024-07-20 |
2 |
Active Exploitation Observed for Linux Kernel Privilege Escalation Vulnerabilit |
2024-06-19 |
2 |
Decryptable PartyTicket Ransomware Reportedly Targeting Ukrainian Entities |
2022-03-04 |
2 |
Scheming with URLs: One-Click Attack Surface in Linux Desktop Environments |
2021-11-17 |
2 |
CrowdStrike Adversary Universe |
2021-10-27 |
2 |
Development Cost of Porting TensorFlow Models to Pure Rust |
2021-09-04 |
1 |
Supply chain attack bypassed MFA through theft of Chrome browser cookies |
2022-01-27 |
1 |
Three Best Practices to Effectively Manage Failed Messages |
2021-11-27 |
1 |
CrowdStrike to Acquire Adaptive Shield |
2024-11-06 |
1 |
How to Fix the Crowdstrike Issue |
2024-07-19 |
1 |
CrowdStrike to Acquire Flow Security |
2024-03-05 |
1 |
How to Leverage Apple Unified Log (AUL) for IR (2020) |
2023-06-02 |
1 |
UAL Thank Us Later: Leveraging User Access Logging for Forensic Investigations |
2023-01-18 |
1 |
Supply Chain Attack via a Trojanized Comm100 Chat Installer |
2022-10-02 |
1 |
Malicious JavaScript Executions: A Perspective from OverWatch Elite |
2022-06-03 |
1 |
A More Modern Approach to Logging in Go (2022) |
2022-04-04 |
1 |
LightBasin: A Roaming Threat to Telecommunications Companies |
2021-10-19 |
1 |
Analyzing the Security of eBPF Maps |
2021-03-06 |
1 |
CrowdStrike to Acquire Humio |
2021-02-19 |
1 |
Recruitment Phishing Scam Imitates CrowdStrike Hiring Process |
2025-01-14 |