Mar 21, 2025Ravie LakshmananThreat Hunting / Vulnerability Threat hunters have uncovered a new threat actor named UAT-5918 that has been attacking critical infrastructure entities in Taiwan since at least 2023. "UAT-5918, a threat actor believed to be motivated by establishing long-term access for information theft, uses a combination of web shells and open-sourced tooling to … [Read more...] about UAT-5918 Targets Taiwan’s Critical Infrastructure Using Web Shells and Open-Source Tools
Announcing the CrowdStrike 2025 Global Crowd Tour
Cybersecurity leaders today face relentless threats — breaches happen in seconds, adversaries constantly evolve, and security teams must adapt faster than ever. CrowdTour 2025 is built for you — the security professionals on the front lines who use CrowdStrike every day — coming together to learn from peers, share real-world defense strategies, and strengthen the community’s … [Read more...] about Announcing the CrowdStrike 2025 Global Crowd Tour
CrowdStrike Researchers Develop Custom XGBoost Objective
All of this means that if we want to minimize surprise FPs between model releases, we must ensure DV ordering preservation. XGBoost is flexible because its Newton-Raphson solver requires only the gradient and Hessian of the objective rather than the objective itself. By adding small perturbations to the gradient and to the Hessian, we can replace the standard XGBoost … [Read more...] about CrowdStrike Researchers Develop Custom XGBoost Objective
Hunting with Elastic Security: Detecting credential dumping with ES|QL
In the shadowy depths of your network, whispers grow louder — something isn’t right. Adversaries are on the prowl, targeting the very keys to your kingdom: your credentials. T1003 - OS Credential Dumping is their weapon of choice to steal password hashes and sensitive authentication materials. They quietly harvest secrets to impersonate users, escalate privileges, and move … [Read more...] about Hunting with Elastic Security: Detecting credential dumping with ES|QL
Cisco Introduces the State of AI Security Report for 2025
As one of the defining technologies of this century, artificial intelligence (AI) seems to witness daily advancements with new entrants to the field, technological breakthroughs, and creative and innovative applications. The landscape for AI security shares the same breakneck pace with streams of newly proposed legislation, novel vulnerability discoveries, and emerging threat … [Read more...] about Cisco Introduces the State of AI Security Report for 2025
YouTube Game Cheats Spread Arcane Stealer Malware to Russian-Speaking Users
Mar 20, 2025Ravie LakshmananMalware / Threat Analysis YouTube videos promoting game cheats are being used to deliver a previously undocumented stealer malware called Arcane likely targeting Russian-speaking users. "What's intriguing about this malware is how much it collects," Kaspersky said in an analysis. "It grabs account information from VPN and gaming clients, and all … [Read more...] about YouTube Game Cheats Spread Arcane Stealer Malware to Russian-Speaking Users
Top 3 Trends in Red Team Exploitation Paths
Though 2024 may be behind us, many of the security threats and vulnerabilities that organizations faced last year remain. The CrowdStrike Professional Services Red Team tracks them all in its efforts to defend organizations against adversaries. The three most common exploitation paths we encountered were: Unsecured Credentials: Weak or exposed credentials remain one … [Read more...] about Top 3 Trends in Red Team Exploitation Paths
CrowdStrike Achieves FedRAMP High Authorization
Securing the Nation's Most Critical Systems: CrowdStrike Achieves FedRAMP High Authorization The evolving landscape of state-sponsored threats demands the highest levels of security for federal systems and critical infrastructure. As part of our longstanding commitment to protecting federal agencies and critical infrastructure, the AI-native CrowdStrike Falcon® platform … [Read more...] about CrowdStrike Achieves FedRAMP High Authorization
New Arcane stealer spreads disguised as Minecraft cheats
At the end of 2024, our experts discovered a new stealer called Arcane, which collects a wide range of data from infected devices. Now cybercriminals have taken it a step further by releasing ArcanaLoader — a downloader that claims to install cheats, cracks, and other “useful” gaming tools, but which actually infects devices with the Arcane stealer. Despite their lack of … [Read more...] about New Arcane stealer spreads disguised as Minecraft cheats
Hackers Exploit Severe PHP Flaw to Deploy Quasar RAT and XMRig Miners
Mar 19, 2025Ravie LakshmananThreat Intelligence / Cryptojacking Threat actors are exploiting a severe security flaw in PHP to deliver cryptocurrency miners and remote access trojans (RATs) like Quasar RAT. The vulnerability, assigned the CVE identifier CVE-2024-4577, refers to an argument injection vulnerability in PHP affecting Windows-based systems running in CGI mode that … [Read more...] about Hackers Exploit Severe PHP Flaw to Deploy Quasar RAT and XMRig Miners