Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Detect OPERATOR PANDA at the Edge with Falcon Adversary Overwatch

CrowdStrike Falcon Adversary Overwatch: ► Detect adversaries hiding in your blind spots. Falcon Adversary Overwatch exposes threats targeting network edge devices—firewalls, routers, and infrastructure traditional security tools can’t see. Watch the demo to see how CrowdStrike detects OPERATOR PANDA in real time and stops edge-driven intrusions that quickly turn into credential theft and identity abuse before they escalate.

CrowdStrike FalconID Brings Phishing-Resistant MFA to Falcon Next-Gen Identity Security

FalconID is now generally available, bringing phishing-resistant MFA to the CrowdStrike Falcon platform and advancing CrowdStrike’s leadership in identity security. Adversaries continue to use legitimate identities to infiltrate and navigate organizations while evading defenses. As they adopt AI, the scale and impact of social engineering and credential abuse are growing. AI-enhanced phishing, MFA fatigue, and session hijacking enable threat actors to bypass MFA.

How the Cloud Reshapes Your Attack Surface

Cloud environments have reshaped the way applications are built and the way attackers break in. Traditional security strategies centered on malware and compromised endpoints are no longer enough. In today’s cloud, adversaries increasingly rely on valid credentials, identity abuse, and native cloud capabilities to move laterally and establish persistence without ever deploying malware.

Falcon Cloud Security Cloud Detection and Response (CDR)

Discover how CrowdStrike Falcon Cloud Security stops breaches with Cloud Detection & Response (CDR). Witness our Real-Time Cloud Detections in action as we identify and mitigate a sophisticated attack by LABYRINTH CHOLLIMA. Learn how our integrated threat intelligence and unified detection & response capabilities help SOC teams outpace modern cloud adversaries.

Falcon for IT: Built-In Response Playbooks for Enterprise-Scale Automation

Adversaries are accelerating their tradecraft, exploiting configuration drift and operational blind spots before teams can respond. Falcon for IT transforms the CrowdStrike Falcon Platform into the unified operational engine of the enterprise, turning visibility into governed, enterprise-scale action.

CrowdStrike 2026 Global Threat Report: The Evasive Adversary Wields AI

As cyber defenses become stronger, adversaries continue to evolve their tactics to succeed. In 2025, the year of the evasive adversary, the threat landscape was defined by attacks that targeted trusted relationships, demonstrated fluency with AI tools, and incorporated tradecraft tailored to exploit security blind spots.

Speed, Stealth, and AI: The CrowdStrike 2026 Global Threat Report

It’s that time of year: The CrowdStrike 2026 Global Threat Report is live, and Adam and Cristian are here to break down the key findings. This year’s report spotlights adversaries’ heightened speed, their evolving use of AI, an increase in activity from China and North Korea, and the growth of supply chain attacks, zero-day exploitation, and cloud targeting. For new listeners, the annual Global Threat Report delivers an analysis of the modern threat landscape based on CrowdStrike's frontline observations and real-world threat intelligence from the previous year.

The Art of Deception: How Threat Actors Master Typosquatting Campaigns to Bypass Detection

Typosquatting is a deceptive technique in which threat actors register misspelled or look-alike domains of legitimate organizations to trick users into visiting fraudulent sites. It remains one of the most effective and underestimated attack vectors in the modern cyber threat landscape. What appears to be a misspelled domain often conceals sophisticated campaigns designed to phish company employees or customers, harvest credentials, deliver malware, and damage organizational reputation.

Notepad++ Supply Chain Attack Explained | CrowdStrike OverWatch Identified It Months Early

Your next software update could be weaponized. In this short breakdown, we examine how adversaries compromised the Notepad++ update mechanism to distribute malware and how CrowdStrike identified the activity four months before public disclosure.

Outpacing Modern Adversaries with the CrowdStrike Agentic SOC

Adversaries are weaponizing AI, accelerating tradecraft and moving from access to impact at machine speed. As breakout times collapse to seconds, security teams cannot rely on manual processes or static automation to keep up. Meet the CrowdStrike Agentic SOC, a new operating model built for the AI era.

The Network Blind Spot Adversaries Exploit

Did you know there may be a blind spot in your network right now? Firewalls, routers, and edge devices often generate minimal logs by default, creating visibility gaps that adversaries can exploit. In this breakdown, we examine how a China-nexus threat group known as Operator Panda leveraged vulnerable network devices to gain access, establish persistence, and remain undetected even after patches were applied.

Hackers Weaponize AI Tools: Watch CrowdStrike Stop the Attack

Your AI tools just became the perfect hiding spot for hackers. Cybercriminals have found a new attack vector: weaponizing the AI assistants your team uses every day. In this live demonstration, we show how adversaries can turn tools like Claude into persistent backdoors and how CrowdStrike Falcon stops them cold. TIMESTAMPS: WHAT YOU'LL LEARN:– How hackers exploit AI automation features to create backdoors– Why password resets and patches won't stop this attack– How behavioral detection catches threats hiding in legitimate tools– Real-time threat prevention in action.

Log Collector Deployment via the Falcon Sensor in Falcon Next-Gen SIEM

See how CrowdStrike Falcon Next-Gen SIEM enables security teams to deploy log collectors instantly via the Falcon Sensor—without relying on traditional software distribution processes. In this demo, you’ll learn how to create a Log Collector Policy, automatically install collectors across host groups, validate installation through Falcon telemetry, and centrally manage third-party data ingestion from Fleet Management.

Validate SOAR Workflows Instantly with Fusion SOAR Test Mode

See how CrowdStrike Falcon Fusion SOAR Test Mode lets security teams validate workflows instantly—without live alerts or production risk. You’ll learn how to run playbooks end-to-end using past events or mock data, safely test high-cost actions like LLM analysis, and debug logic with full visibility. With built-in transform testing and mock inputs, Test Mode speeds up automation and reduces errors for faster, safer deployment.

Exposing Insider Threats through Data Protection, Identity, and HR Context

Insider threats pose a growing risk to organizations. Whether insiders take malicious actions, exhibit negligent behavior, or make accidental errors, they have the potential to cause significant harm to an organization’s assets, sensitive data, and reputation. Insiders can pose a variety of risks, from stealing confidential data and intellectual property to disrupting systems.

Real-Time Cloud Detection & Response (CDR)

As adversaries accelerate with GenAI and blend into legitimate cloud activity, real-time correlation between telemetry and control plane events is critical. Without it, investigations stall and visibility gaps grow. CrowdStrike delivers real-time detections and automated cloud-native response to stop adversaries in seconds. Subscribe and Stay Updated.

CrowdStrike Named a Customers' Choice in 2026 Gartner Peer Insights Voice of the Customer for User Authentication

CrowdStrike has been named a Customers’ Choice in the 2026 Gartner Peer Insights “Voice of the Customer for User Authentication” report. For the second consecutive year, CrowdStrike has the highest volume of verified reviews and more 5-star ratings (129) than any other vendor in the report based on 179 overall responses in the 2026 report.

Interview with a Threat Hunter: Brody Nisbet, Sr. Director of CrowdStrike OverWatch

Threat hunting is hard to define, but Brody Nisbet, Sr. Director of CrowdStrike OverWatch, breaks down the basics in an episode that starts with the CrowdStrike OverWatch mission and dives into his stories from the front lines of threat hunting.

How to Scale SOC Automation with Falcon Fusion SOAR

Most SOC teams don’t struggle with what they need to automate — they struggle with where to start. Between complex playbooks, brittle integrations, and the fear of breaking something in production, security orchestration, automation, and response (SOAR) often feels harder to adopt than it should be.

Detect OPERATOR PANDA at the Edge with Falcon Adversary Overwatch

CrowdStrike Falcon Adversary Overwatch: ► Detect adversaries hiding in your blind spots. Falcon Adversary Overwatch exposes threats targeting network edge devices—firewalls, routers, and infrastructure traditional security tools can’t see. Watch the demo to see how CrowdStrike detects OPERATOR PANDA in real time and stops edge-driven intrusions that quickly turn into credential theft and identity abuse before they escalate.

Inside the Human-AI Feedback Loop Powering CrowdStrike's Agentic Security

Adversaries are continuously evolving their tactics, techniques, and procedures to evade both legacy and AI-native defenses, and they’re using AI to their advantage. Stopping them requires a new approach: humans and AI working together. While AI can correlate massive volumes of telemetry at machine speed, pattern recognition alone is not enough to stop modern attacks. Training on detections teaches models what happened, but not why it mattered.

CrowdStrike Is the Only Vendor to Be Named a Customers' Choice in 2025 Gartner Voice of the Customer for External Attack Surface Management

External attack surfaces are expanding faster than most organizations can track. Internet-facing cloud services, network devices, commercial AI tools, and third-party infrastructure are driving the growth of unintended exposure outside security teams’ control.

Falcon Cloud Security: Visibility and Control Over Your Cloud Risks

Falcon Cloud Security Cloud Risk Rules correlate insights across your cloud environment to identify potentially dangerous states and combinations, even when individual findings appear low-severity in isolation amid the countless security risks your cloud infrastructure faces every day.

OpenClaw: Discovery, Exposure, Response, and Runtime Protection with the CrowdStrike Falcon Platform

Agentic AI is moving fast into the enterprise — and with it comes new risk. OpenClaw is an open-source AI agent that can autonomously execute actions across systems, making it a powerful productivity tool and a potential enterprise backdoor if misconfigured or exposed.

Advanced Web Shell Detection and Prevention: A Deep Dive into CrowdStrike's Linux Sensor Capabilities

Web shells remain one of the most potent weapons in an adversary’s arsenal, particularly when targeting Linux servers and containers. These malicious scripts serve as powerful remote access tools with capabilities such as process execution, filesystem access, and tunneling of network connections.

Threat Intelligence: Hunt Agent

Threat hunting no longer requires hours of manual research or specialized expertise. CrowdStrike Hunt Agent uses intelligence driven hunting guides and Charlotte AI to automatically detect and analyze suspicious activity in your environment. See how analysts gain instant expert insight prioritize real adversaries and uncover threats before they become incidents.

What Security Teams Need to Know About OpenClaw, the AI Super Agent

OpenClaw, an open-source AI agent previously known as Clawdbot and Moltbot, is a powerful personal assistant that can connect to LLMs, integrate with external APIs, and autonomously execute an array of tasks like sending email or controlling browsers. While OpenClaw carries the promise of AI-driven productivity, it also presents growing security concerns. OpenClaw is installed on local machines or dedicated servers.

CrowdStrike Named a Customers' Choice in 2026 Gartner Peer Insights Voice of the Customer for Application Security Posture Management Tools

CrowdStrike has been recognized as a Customers’ Choice in the 2026 Gartner Peer Insights Voice of the Customer for Application Security Posture Management (ASPM) Tools report, a distinction based entirely on reviews from verified users. CrowdStrike received the top customer ratings across product capabilities and highest rating for deployment experience of all the vendors evaluated.

CrowdStrike Falcon Scores Perfect 100% in SE Labs' Most Challenging Ransomware Test

The CrowdStrike Falcon platform has once again delivered a perfect score in the SE Labs October 2025 Enterprise Advanced Security (EDR) Ransomware test: 100% detection accuracy, 100% protection accuracy, 100% legitimate accuracy, and 100% total accuracy — with zero false positives.

Secure AI with CrowdStrike: Real-World Stories of Protecting AI Workloads and Data

AI is reshaping business at machine speed. From automating claims to improving customer engagement, organizations are embedding AI into core workflows faster than most security teams can track. As AI systems expand, they introduce a new class of security considerations. AI no longer lives in a single layer of the stack. It runs on cloud infrastructure, processes sensitive data, and operates through a growing network of human and non-human identities.