CrowdStrike believes that Bloomberg’s reporting for its October 25, 2024 story is misleading. CrowdStrike had a bona fide, signed, non-cancellable order placed by Carahsoft under its distribution agreement. CrowdStrike books all orders in compliance with U.S. Generally Accepted Accounting Principles (GAAP), and we stand by the accounting of the transaction. Any assertion that … [Read more...] about CrowdStrike Statement on Bloomberg’s October 25, 2024 Story
The Path to Autonomous Observability
Autonomous observability for system monitoring and management aims to use GenAI and machine learning to automatically detect, diagnose and resolve issues. In conversations about cloud observability today, discussions often shift from “what’s possible” to “what’s practical.” Too often, these conversations highlight the shortcomings of current observability processes, … [Read more...] about The Path to Autonomous Observability
Fal.Con Europe – Bringing the Power of the Crowd to Amsterdam on Nov 6-7th
CrowdStrike’s annual Fal.Con cybersecurity conference presents an invaluable opportunity for cybersecurity leaders and practitioners to come together, share best practices, learn the latest threats to their organizations and discover how to best defend against them. Since its inception, Fal.Con has taken place solely in the United States, attracting participants from … [Read more...] about Fal.Con Europe – Bringing the Power of the Crowd to Amsterdam on Nov 6-7th
Researchers Discover Command Injection Flaw in Wi-Fi Alliance’s Test Suite
Oct 25, 2024Ravie LakshmananVulnerability / Wi-Fi Security A security flaw impacting the Wi-Fi Test Suite could enable unauthenticated local attackers to execute arbitrary code with elevated privileges. The CERT Coordination Center (CERT/CC) said the vulnerability, tracked as CVE-2024-41992, said the susceptible code from the Wi-Fi Alliance has been found deployed on Arcadyan … [Read more...] about Researchers Discover Command Injection Flaw in Wi-Fi Alliance’s Test Suite
How AI Is Transforming Facilities Management
Is artificial intelligence (AI) as great as everyone says? It has made its way into almost every industry, so it is certainly popular. While some may hesitate to adopt it, using AI could revolutionize practically every aspect of facilities management. Whether managers need help sorting records, responding to emails or scheduling staff, AI can help. Facility Management … [Read more...] about How AI Is Transforming Facilities Management
New Account Linking Capabilities Use AI to Thwart Identity-Based Attacks
As networks become increasingly distributed, user identities are becoming a top adversary target. CrowdStrike’s 2024 Threat Hunting Report and 2024 Global Threat Report state 5 of the top 10 MITRE tactics we observed in 2023 were identity-based, and the CrowdStrike 2023 Threat Hunting Report noted a 583% year-over-year increase in Kerberoasting attacks. These findings … [Read more...] about New Account Linking Capabilities Use AI to Thwart Identity-Based Attacks
The new iPad mini is available today
Beginning today, the ultraportable new iPad mini, powered by the A17 Pro chip and built for Apple Intelligence, is now available. Starting at just $499 with double the storage of the previous generation, the new iPad mini delivers incredible value and the full iPad experience in an ultraportable design. A17 Pro delivers a huge … [Read more...] about The new iPad mini is available today
Four Pillars of an Effective Cybersecurity Awareness Program
In today’s digital landscape, cybersecurity threats don’t take breaks — and neither should your small business. In fact, small and medium-sized businesses (SMBs) are prime targets, seen as easy prey due to their limited resources and often weaker security postures. But here’s the reality: Lack of resources doesn’t mean you lack options. SMBs can still build a robust … [Read more...] about Four Pillars of an Effective Cybersecurity Awareness Program
Detecting Microsoft Entra ID Primary Refresh Token Abuse with Next-Gen SIEM
Microsoft Entra ID Primary Refresh Tokens (PRTs) are an attractive target for threat actors because they are long-lived, they are broadly scoped and they often don’t have additional multifactor authentication requirements after they are obtained. In this blog, we will discuss what PRTs are, how they are issued and how recently released research gives threat attackers a new way … [Read more...] about Detecting Microsoft Entra ID Primary Refresh Token Abuse with Next-Gen SIEM
New Qilin.B Ransomware Variant Emerges with Improved Encryption and Evasion Tactics
Oct 24, 2024Ravie LakshmananRansomware / Cybercrime Cybersecurity researchers have discovered an advanced version of the Qilin ransomware sporting increased sophistication and tactics to evade detection. The new variant is being tracked by cybersecurity firm Halcyon under the moniker Qilin.B. "Notably, Qilin.B now supports AES-256-CTR encryption for systems with AESNI … [Read more...] about New Qilin.B Ransomware Variant Emerges with Improved Encryption and Evasion Tactics