Mar 20, 2024NewsroomDoS Attack / Network Security A novel denial-of-service (DoS) attack vector has been found to target application-layer protocols based on User Datagram Protocol (UDP), putting hundreds of thousands of hosts likely at risk. Called Loop DoS attacks, the approach pairs "servers of these protocols in such a way that they communicate with each other … [Read more...] about New ‘Loop DoS’ Attack Impacts Hundreds of Thousands of Systems
AI’s Expanding Role in Cyber Attacks
Mar 19, 2024NewsroomGenerative AI / Incident Response Large language models (LLMs) powering artificial intelligence (AI) tools today could be exploited to develop self-augmenting malware capable of bypassing YARA rules. "Generative AI can be used to evade string-based YARA rules by augmenting the source code of small malware variants, effectively lowering detection rates," … [Read more...] about AI’s Expanding Role in Cyber Attacks
5 Best Practices for Securing Azure Resources
Cloud computing has become the backbone for modern businesses due to its scalability, flexibility and cost-efficiency. As organizations choose cloud service providers to power their technological transformations, they must also properly secure their cloud environments to protect sensitive data, maintain privacy and comply with stringent regulatory requirements. Today’s … [Read more...] about 5 Best Practices for Securing Azure Resources
Fortra Patches Critical RCE Vulnerability in FileCatalyst Transfer Tool
Mar 18, 2024NewsroomVulnerability / Threat Mitigation Fortra has released details of a now-patched critical security flaw impacting its FileCatalyst file transfer solution that could allow unauthenticated attackers to gain remote code execution on susceptible servers. Tracked as CVE-2024-25153, the shortcoming carries a CVSS score of 9.8 out of a maximum of 10. "A directory … [Read more...] about Fortra Patches Critical RCE Vulnerability in FileCatalyst Transfer Tool
CrowdStrike and Intel Research to Advance Endpoint Security
At CrowdStrike, we are relentlessly researching and developing new technologies to outpace new and sophisticated threats, track adversaries’ behavior and stop breaches. As today’s adversaries continue to become faster and more advanced, the speed of enterprise detection and response is paramount. It is also a challenge for today’s organizations, which face mounting attack … [Read more...] about CrowdStrike and Intel Research to Advance Endpoint Security
State of Wyoming Looks to Expand CrowdStrike Protections Statewide
With its wild beauty, favorable tax laws and growing tech scene, the State of Wyoming is experiencing a surge in business growth. But with this prosperity comes a rise in cyber risk due to the expanding commerce platforms and digital infrastructure needed to support it. “We’ve had several large tech companies relocate to Wyoming recently,” explained Jason Strohbehn, Deputy CISO … [Read more...] about State of Wyoming Looks to Expand CrowdStrike Protections Statewide
The Anatomy of an ALPHA SPIDER Ransomware Attack
ALPHA SPIDER is the adversary behind the development and operation of the Alphv ransomware as a service (RaaS). Over the last year, ALPHA SPIDER affiliates have been leveraging a variety of novel techniques as part of their ransomware operations. CrowdStrike Services has observed techniques such as the usage of NTFS Alternate Data Streams for hiding a reverse SSH tool, … [Read more...] about The Anatomy of an ALPHA SPIDER Ransomware Attack
Montage Health Consolidates Its Cybersecurity Strategy with CrowdStrike
When Tahir Ali became CTO and CISO at Montage Health in 2021, he inherited a unique set of cybersecurity challenges. For one, the healthcare sector was getting bombarded with attacks, including distributed denial of service (DDoS), phishing and social engineering attacks. At the same time, the California-based nonprofit healthcare system was integrating more networked medical … [Read more...] about Montage Health Consolidates Its Cybersecurity Strategy with CrowdStrike
Hackers Using Cracked Software on GitHub to Spread RisePro Info Stealer
Mar 16, 2024NewsroomMalware / Cybercrime Cybersecurity researchers have found a number of GitHub repositories offering cracked software that are used to deliver an information stealer called RisePro. The campaign, codenamed gitgub, includes 17 repositories associated with 11 different accounts, according to G DATA. The repositories in question have since been taken down by … [Read more...] about Hackers Using Cracked Software on GitHub to Spread RisePro Info Stealer
How Wi-Fi WPA2 is hacked using PMKID interception
Being concerned about the security of your wireless network is not as paranoid as some may think it is. Many routers have a setting enabled by default that makes your WPA/WPA2-protected Wi-Fi network rather vulnerable. In this post, we’ll discuss one of the most effective methods of hacking wireless networks that exploits this setting, and how to protect against it. The … [Read more...] about How Wi-Fi WPA2 is hacked using PMKID interception