Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Detect Multi-Stage Threats with Behavioural Detections in Falcon Next-Gen SIEM

See how Falcon Next-Gen SIEM uses Behavioural Detections to expose complex, multi-stage attacks that static rules miss. Watch how security teams correlate related events across all data—endpoint, cloud, and third-party—to detect stealthy threats in real time and respond with confidence. CrowdStrike Falcon Next-Gen SIEM: Consolidate security operations with the world’s most complete AI-native SOC platform.

Falcon Data Protection for Cloud Extends DSPM into Runtime

In a cloud-first world, sensitive data moves quickly between microservices, APIs, SaaS applications, and storage services. CrowdStrike Falcon Data Protection for Cloud, now generally available, delivers runtime visibility and protection for sensitive data in motion so organizations have continuous insight into how data moves, when it’s accessed, and where it’s at risk.

CrowdStrike Research: Security Flaws in DeepSeek-Generated Code Linked to Political Triggers

In January 2025, China-based AI startup DeepSeek (深度求索) released DeepSeek-R1, a high-quality large language model (LLM) that allegedly cost much less to develop and operate than Western competitors’ alternatives. CrowdStrike Counter Adversary Operations conducted independent tests on DeepSeek-R1 and confirmed that in many cases, it could provide coding output of quality comparable to other market-leading LLMs of the time.

Prompted to Fail: The Security Risks Lurking in DeepSeek-Generated Code

CrowdStrike research into AI coding assistants reveals a new, subtle vulnerability surface: When DeepSeek-R1 receives prompts the Chinese Communist Party (CCP) likely considers politically sensitive, the likelihood of it producing code with severe security flaws increases by up to 50%. Stefan Stein, manager of the CrowdStrike Counter Adversary Operations Data Science team, joined Adam and Cristian for a live recording at Fal.Con 2025 to discuss how this project got started, the methodology behind the team’s research, and the significance of their findings.

Defeating BLOCKADE SPIDER: How CrowdStrike Stops Cross-Domain Attacks

Cross-domain attacks exemplify adversaries’ drive for speed and stealth. In these attacks, threat actors navigate multiple domains such as endpoint, cloud, and identity systems to maximize their reach and impact. Their goal is to exploit the weaknesses in organizations’ fast-growing and complex environments.

To Stop AI-Powered Adversaries, Defenders Must Fight Fire with Fire

Anthropic's Threat Intelligence team recently uncovered and disrupted a sophisticated nation-state operation that weaponized Claude’s agentic capabilities and the Model Context Protocol (MCP) to orchestrate automated cyberattacks simultaneously against multiple targets worldwide. This AI-powered attack automated reconnaissance, vulnerability exploitation, lateral movement, and more across multiple victim environments at unprecedented scale and speed.

From Vulnerability Management to Exposure Management: The Platform Era Has Arrived

AI has collapsed the vulnerability exploit lifecycle. Adversaries now discover, weaponize, and exploit exposures across hybrid environments in minutes — chaining together misconfigurations, unpatched systems, and stolen credentials to gain rapid access and move laterally across environments. For defenders, the speed of the adversary changes everything.

CrowdStrike Named Overall Leader in 2025 KuppingerCole ITDR Leadership Compass

CrowdStrike has been named the Overall Leader in the 2025 KuppingerCole Leadership Compass for Identity Threat Detection and Response (ITDR), positioned furthest to the right. This validates our ongoing mission to secure every identity — human, non-human, and AI agent. We are recognized as a Leader across all key categories: Product, Innovation, Market, and Overall Ranking.

Falcon Exposure Management Network Vulnerability Assessment: Demo Drill Down

CrowdStrike Falcon Exposure Management simplifies network security with its Network Vulnerability Assessment, offering a modern way to secure network infrastructure without complex legacy tools. Learn how the system utilizes your existing Falcon sensors to provide unmatched continuous visibility-instantly correlating new threats against your assets—and leverage authenticated scanning for deeper, more complete vulnerability inspection.

How the Falcon Platform Delivers Fast, CISO-Ready Executive Reports

Most exposure reporting is still slow, error-prone, and disconnected from reality. Analysts spend hours collecting and formatting data using different tools that produce conflicting priorities. Reports are bloated with raw CVE lists that lack context and rarely connect to business impact. They are often delayed, arriving after the adversaries have moved. While teams struggle with outdated reports, adversaries are seeking new ways to gain initial access.

Build SOAR Workflows Instantly with Charlotte AI

With Charlotte AI and Falcon NextGen SIEM, build SOAR workflows instantly from natural language. Create reliable, intelligent automation that helps SOC teams respond at machine speed. CrowdStrike Falcon Next-Gen SIEM: Consolidate security operations with the world’s most complete AI-native SOC platform.

Fuel the Agentic SOC with High-Fidelity Data using Falcon Onum

Power your Agentic SOC with Falcon Onum. Watch how teams eliminate data bottlenecks and move at machine speed with intelligent pipeline management—collecting, enriching, and routing high-fidelity data across the enterprise in minutes. CrowdStrike Falcon Next-Gen SIEM: Consolidate security operations with the world’s most complete AI-native SOC platform. Subscribe and Stay Updated.

CrowdStrike Expands Agentic Security Workforce with New Agents

CrowdStrike is accelerating our vision for the SOC with the launch of new, specialized agents built to tackle some of the toughest modern challenges in security operations: faster data pipeline creation, simpler custom app creation, and continuous, authenticated exposure scanning. Earlier this year, we charted a path toward the agentic SOC — where security teams command fleets of intelligent agents that reason, decide, and act at machine speed while under defender control.

CrowdStrike Leads New Evolution of Security Automation with Charlotte Agentic SOAR

AI has transformed both how attackers operate and how defenders must respond. Today’s adversaries use AI to shift tactics in real time, forcing defenders to react at unprecedented speed. Many SOCs struggle to keep pace due to the limits of legacy automation. Even the most mature playbooks can’t anticipate every scenario or data variation, because playbooks are predictable — but adversaries aren’t.

Falcon for XIoT Innovations Improve Speed and Visibility in OT Networks

CrowdStrike Falcon for XIoT is gaining new innovations to protect operational technology (OT) and XIoT environments as they grow larger and more interconnected. The rapid expansion of industrial systems has led to blind spots across segmented networks, unmanaged devices, and legacy infrastructure. Most OT security tools, siloed by design, fail to see which assets are connected or how they communicate.

CrowdStrike 2025 European Threat Landscape Report: Extortion Rises, Nation-State Activity Intensifies

Europe remains a prime target for global adversaries. Financially motivated eCrime groups continue to target the region as espionage and hacktivism escalate amid geopolitical turmoil stemming from ongoing conflicts. The CrowdStrike 2025 European Threat Landscape Report, based on frontline intelligence from CrowdStrike’s elite threat hunters and intelligence analysts, provides a definitive view of adversaries operating within or targeting Europe.