We're excited about the integration of Cisco XDR and Splunk Enterprise Security, creating a SecOps platform that can grow with customers as needs change. Source link … [Read more...] about Cisco & Splunk: A Complete SOC Platform Purpose-Built for the AI-Driven Future
Complete
The Complete Guide to Capacity Management in Kubernetes
In the dynamic world of container orchestration, Kubernetes stands out as the undisputed champion, empowering organizations to scale and deploy applications seamlessly. Yet, as the deployment scope increases, so do the associated Kubernetes workload costs, and the need for effective resource capacity planning becomes more critical than ever. When dealing with containers and … [Read more...] about The Complete Guide to Capacity Management in Kubernetes
Falcon Complete: Zero-Day Exploit Case Study
CrowdStrike Counter Adversary Operations is committed to analyzing active exploitation campaigns and detecting and blocking zero-days to protect our customers. In July 2023, the CrowdStrike Falcon® Complete managed detection and response (MDR) team discovered an unknown exploit kit leveraging a still-unknown vulnerability affecting the Windows Error Reporting (WER) component. … [Read more...] about Falcon Complete: Zero-Day Exploit Case Study
Falcon Complete MDR Thwarts VANGUARD PANDA Tradecraft
VANGUARD PANDA Background On May 24, 2023, industry and government sources detailed China-nexus activity in which the threat actor dubbed Volt Typhoon targeted U.S.-based critical infrastructure entities. CrowdStrike Intelligence tracks this actor as VANGUARD PANDA. Since at least mid-2020, the CrowdStrike Falcon® Complete managed detection and response (MDR) team and the … [Read more...] about Falcon Complete MDR Thwarts VANGUARD PANDA Tradecraft
Falcon CWP Complete Closing Cloud Security Skills Gap
The need for speed and agility in today’s digital business requires changes to IT infrastructure, most notably the shift to cloud-native architectures and the adoption of DevOps best practices to improve the speed and efficiency with which enterprise applications are brought to market. This shift has led many businesses to move to containers, microservices and Kubernetes (K8s) … [Read more...] about Falcon CWP Complete Closing Cloud Security Skills Gap
Complete and continuous remote worker visibility with Network Visibility Module data as a primary telemetry source
Navigating the new normal Organizations are currently facing new challenges related to monitoring and securing their remote workforces. Many users don’t always use their VPNs while working remotely – this creates gaps in visibility that increase organizational risks. In the past, many organizations viewed these occasional gaps in visibility as negligible risks due to low … [Read more...] about Complete and continuous remote worker visibility with Network Visibility Module data as a primary telemetry source
Duck Hunting w/Falcon Complete Pt. 1: QakBot Malware Overview
Adversaries constantly develop new tactics that enhance their capabilities to deploy malware across networked environments and monetize infected systems. This blog is Part 1 of a three-part series detailing research and observations by the CrowdStrike® Falcon Complete™ managed services team regarding one such malware variant, QakBot (aka QBot), and its behavior in recent … [Read more...] about Duck Hunting w/Falcon Complete Pt. 1: QakBot Malware Overview
Falcon Complete Uncovers Global Attack Campaign [Case Study]
In this blog, we describe a recent incident that highlights the CrowdStrike® Falcon Complete™ team’s ability to act as an extension of our customer’s security team to quickly detect, triage and contain an active attacker before they were able to complete their goal. In this example, we outline an active web exploitation campaign that was impacting multiple customers at the same … [Read more...] about Falcon Complete Uncovers Global Attack Campaign [Case Study]
How the Falcon Complete Team Stopped an RDP Attack [Part 1]
Welcome to the CrowdStrike® Falcon CompleteTM team’s first “Tales from the Trenches” blog, where we describe a recent intrusion that shows how the Falcon Complete managed detection and response (MDR) service operates as an extension of the customer’s security team to quickly detect, investigate and contain an active attacker before they’re able to complete their goal. Once this … [Read more...] about How the Falcon Complete Team Stopped an RDP Attack [Part 1]
How the Falcon Complete Team Stopped an RDP Attack [Part 2]
In Part 1 of this two-part “Tales from the Trenches” blog, we examined a stealthy Remote Desktop Protocol (RDP) intrusion uncovered by CrowdStrike® Falcon CompleteTM experts. In this installment, we’ll walk you through remediation efforts, highlighting Falcon Complete’s ability to directly eject a threat actor and bring the customer’s environment back to a clean, operational … [Read more...] about How the Falcon Complete Team Stopped an RDP Attack [Part 2]