Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-01-27CrowdStrikeCrowdStrike Intelligence Team
Early Bird Catches the Wormhole: Observations from the StellarParticle Campaign
GoldMax
2022-01-21CrowdStrikeFalcon OverWatch Team
Better Together: The Power of Managed Cybersecurity Services in the Face of Pressing Global Security Challenges
LockBit LockBit BITWISE SPIDER
2022-01-19CrowdStrikeCrowdStrike Intelligence Team
Technical Analysis of the WhisperGate Malicious Bootloader
WhisperGate
2022-01-13CrowdStrikeMihai Maganu
Linux-Targeted Malware Increases by 35% in 2021: XorDDoS, Mirai and Mozi Most Prevalent
Mirai Mozi XOR DDoS
2022-01-11CrowdStrikeAnmol Maurya
TellYouThePass Ransomware Analysis Reveals a Modern Reinterpretation Using Golang
TellYouThePass
2021-12-29CrowdStrikeBenjamin Wiley, Falcon OverWatch Team
OverWatch Exposes AQUATIC PANDA in Possession of Log4Shell Exploit Tools During Hands-on Intrusion Attempt
Earth Lusca
2021-12-29CrowdStrikeBenjamin Wiley, Falcon OverWatch Team
OverWatch Exposes AQUATIC PANDA in Possession of Log4Shell Exploit Tools During Hands-on Intrusion Attempt
Cobalt Strike
2021-12-28CrowdStrikeBlair Foster, satoshi tanda, Timo Kreuzer, Yarden Shafir
CrowdStrike Strengthens Exploit Protection Using Intel CPU Telemetry
2021-12-22CrowdStrikeIan Barton, Randy Burton
CrowdStrike Launches Free Targeted Log4j Search Tool
2021-12-10CrowdStrikeCrowdStrike Intelligence Team
Log4j2 Vulnerability “Log4Shell” (CVE-2021-44228)
2021-12-07CrowdStrikeShaun Hurley
Critical Hit: How DoppelPaymer Hunts and Kills Windows Processes
DoppelPaymer
2021-11-29CrowdStrikeFalcon OverWatch Team
Nowhere to Hide: Detecting SILENT CHOLLIMA’s Custom Tooling
2021-11-17CrowdStrikeLiviu Arsene, Sarang Sonawane, Thomas Moses
Ransomware (R)evolution Plagues Organizations, But CrowdStrike Protection Never Wavers
LockBit
2021-11-12CrowdStrikeAnmol Maurya
Golang Malware Is More than a Fad: Financial Motivation Drives Adoption
Snatch
2021-11-10CrowdStrikeAntonio Parata
Ploutus ATM Malware Case Study: Automated Deobfuscation of a Strongly Obfuscated .NET Binary
Ploutus ATM
2021-11-09CrowdStrikeLukas Kupczyk, Max Julian Hofmann
Scheming with URLs: One-Click Attack Surface in Linux Desktop Environments
2021-11-04CrowdStrikeEric Loui, Josh Reynolds
CARBON SPIDER Embraces Big Game Hunting, Part 2
BlackMatter Griffon BlackMatter DarkSide HiddenTear JSSLoader
2021-10-27CrowdStrikeFalcon OverWatch Team
Tales From the Cryptojacking Front Lines
2021-10-25CrowdStrikeFalcon OverWatch Team
OverWatch Elite In Action: Prompt Call Escalation Proves Vital to Containing Attack
MimiKatz
2021-10-25CrowdStrikeMihai Maganu
WebAssembly Is Abused by eCriminals to Hide Malware