Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

CrowdStrike Expands ChatGPT Enterprise Integration with Enhanced Audit Logging and Activity Monitoring

As organizations scale ChatGPT Enterprise across departments, AI is becoming embedded in everyday business operations. Finance teams are building custom GPTs. Developers are leveraging Codex to act on codebases. Employees are invoking third-party tools within AI conversations to automate workflows. As adoption accelerates, security teams face a fundamental challenge: visibility around agents deployed and running in SaaS environments.

Accelerating AI Discovery & Governance with the Falcon Platform

As AI adoption accelerates, so does shadow AI. Without a complete inventory of AI tools, agents, and activity, organizations are exposed to unapproved usage and data risk. In this video, you will see how the Falcon platform helps teams: Discover AI tools, models, and services in seconds Identify unapproved and risky usage See where AI is running and what it can access across endpoints Take action and enforce governance at scale.

CrowdStrike Named a Leader in Frost & Sullivan 2026 Radar for Cloud-Native Application Protection Platforms

We're proud to announce that Frost & Sullivan has named CrowdStrike a Leader for the fourth consecutive time in the 2026 Radar for Cloud-Native Application Protection Platforms. This recognition validates our continued investment in combining posture management with real-time detection and response, and reinforces our leadership in stopping cloud attacks.

Exposure Prioritization Agent: Demo Drill Down

Vulnerability volume continues to rise, making it difficult for security teams to determine which exposures actually matter. Without clear prioritization, teams are forced to react to volume, often focusing on severity scores instead of real risk. In this demo drill down, we showcase the Exposure Prioritization Agent within Falcon Exposure Management. You’ll see how AI-driven prioritization uses ExPRT.AI, adversary intelligence, and business context to reduce millions of vulnerabilities into a focused set of high-risk exposures.

CrowdStrike Falcon Cloud Security Delivered 264% ROI Through Unified Cloud Protection

Many modern cloud security challenges come down to visibility. The complexity of modern environments, the deluge of alerts, and the lack of relevant context make it difficult for security teams to identify and prioritize threats — and easy for adversaries to slip through undetected.

CrowdStrike Expands Real-Time Cloud Detection and Response to Google Cloud

Complexity has become a defining security challenge as organizations expand across hybrid and multi-cloud environments. In fact, 52% of surveyed organizations ranked multi/hybrid cloud complexity among their top three infrastructure concerns.1 This complexity creates fragmented visibility across cloud providers, workloads, and Kubernetes environments — gaps that adversaries increasingly exploit to move undetected.

Introducing the CrowdStrike Shadow AI Visibility Service

Since the launch of CrowdStrike AI Security Services in 2025, our Professional Services team has yet to encounter an organization with an accurate inventory of the AI tools and services in use across its environment. One customer counted 150 agents in its inventory. We found over 500. Another had not approved agentic development at all; we discovered over 70 active agents.

CrowdStrike Falcon Platform Achieves 441% ROI in Three Years

A new IDC Business Value study illustrates the measurable value of cybersecurity platform consolidation: Organizations that standardized on the CrowdStrike Falcon platform achieved up to 441% return on investment over three years, with payback in just four months. IDC conducted in-depth interviews of CrowdStrike customers across industries to assess the Falcon platform’s business value.

Frontier AI Is Collapsing the Exploit Window. Here's How Defenders Must Respond.

The defensive timeline in cybersecurity is changing faster than most organizations are prepared for. For years, defenders operated with an assumption that there would be some delay between vulnerability disclosure and exploitation. That delay created a window for patching, mitigation, and detection. It wasn’t perfect, but it gave security teams time to act. Frontier AI is removing that buffer and changing how organizations must consider cyber risk.

Stopping AI Agent Attacks: How Falcon AIDR Blocks Prompt Injection

See how attackers can exploit AI agents like OpenClaw using hidden prompt injection techniques—and how CrowdStrike Falcon AIDR stops them in real time. In this demo, we show how a seemingly harmless resume contains invisible malicious instructions that trick an AI agent into leaking sensitive data, including API tokens and system access. Then, we replay the same scenario with Falcon AIDR enabled, where the attack is detected and blocked before any damage is done.

Frontier AI for Defenders: CrowdStrike and OpenAI TAC

CrowdStrike has been selected for OpenAI's Trusted Access for Cyber (TAC) program. Today, OpenAI released GPT-5.4-Cyber, a frontier model designed for defensive cybersecurity, and expanded the TAC program to give verified, selected defenders governed access through identity verification and tiered controls. CrowdStrike continues to lead the market in secure AI adoption, trusted by AI leaders and organizations of all sizes to accelerate the world's AI revolution.

Exposure Summary Agent: Demo Drill Down

Vulnerability data is often fragmented, leaving security teams to interpret scattered details across sources. Without clear context, patching decisions are driven by severity scores instead of actual risk. In this demo drill down, we showcase the Exposure Summary Agent within Falcon Exposure Management. You’ll see how AI-enhanced vulnerability descriptions consolidate exploit methods, affected systems, and attacker intent into a single, structured view—eliminating the need to piece together raw data.

82% of Attacks Skip Malware Entirely

27 seconds. That’s how fast an adversary can move to your critical systems. In this clip, you’ll learn: How adversaries blend in using everyday admin tools Why traditional, reactive security models fall behind What makes modern intrusions so hard to detect Watch the full video to see how teams are shifting to proactive hunting.

"What are wheels without an engine?"

At, George Kurtz and Dan Ives used a racing analogy to break down AI and cybersecurity. “The engine is the data… we are creating the data,” George explained. “If you’re a net data creator… you have a massive advantage.” In an AI-driven world, there will be two types of companies: those that create proprietary data and those that don’t.

See Falcon Secure Access in Action

Adversaries are targeting the browser — hijacking sessions, stealing credentials, and exploiting gaps traditional tools can’t see. Watch how CrowdStrike's Falcon Secure Access delivers zero trust runtime protection directly in the browser, combining secure access with deep, real-time visibility and control over user activity. Subscribe and stay updated!

Why Threat Hunting Isn't Optional

27 seconds That is the fastest breakout time recorded last year. In less time than it takes to read this sentence, an adversary can gain access and begin moving through your network. Join us as we explore why proactive threat hunting is no longer optional in a world where 82% of attacks are malware-free. From AI-amplified reconnaissance to adversaries "living off the land" with your own IT tools, we break down how to stop intrusions before they become breaches.

Charlotte Agentic SOAR: The next evolution of intelligent and adaptive security automation

At Fal.Con 2025, CrowdStrike introduced Agentic SOAR, uniting automation and intelligent agents to deliver the next evolution of fast, adaptive security operations. This innovation sets a new standard for enterprise protection, enabling SOCs to stay ahead of threats and operate with greater confidence and agility. Subscribe and stay updated!

Lightboard Lab: What Modern Data Security Requires

Modern data security must go beyond data at rest. Sensitive data is constantly moving across endpoints, SaaS, cloud, and AI—creating risk that traditional DLP and DSPM tools can’t see. Learn how Falcon Data Security delivers real-time visibility into data in motion to detect and stop data loss before it becomes a breach. Subscribe and stay updated!

Lightboard Lab: How Falcon Data Security Stops Data Theft

Data breaches often happen with valid access. Even authorized users and trusted devices can lead to data loss—from insider threats to credential-based attacks. See how Falcon Data Security detects and stops risky data movement in real time, even when activity looks normal. Subscribe and stay updated!

Lightboard Lab: Closing the Valley of Visibility in Network Vulnerability Assessment

Network Vulnerability Assessment is often treated as a point-in-time exercise—but real environments don’t stand still. Between long scan cycles, two things are constantly changing: network devices drift as configurations and versions evolve, and the world around them shifts as new vulnerabilities are disclosed.

George Kurtz + Dan Ives on AI Agents Bypassing Security Policies

One AI agent didn’t have permission to fix an issue… so it asked another agent with access to do it. Another? It rewrote the security policy to achieve its goal. This isn’t theory. This is happening. George_Kurtz sat down with DivesTech to discuss why AI needs guardrails.

Hunting Supply Chain Attacks with Jared Myers, Director, CrowdStrike OverWatch

Supply chain attacks targeting AI have recently been making headlines — and keeping the CrowdStrike OverWatch team busy. Jared Myers, director of CrowdStrike OverWatch, joins Adam in this episode to discuss his team’s approach to detecting and responding to these attacks.

Lightboard Lab: How to Secure Non-Human Identities Against Modern Threats

See how CrowdStrike Falcon Next-Gen Identity Security provides complete visibility, control, and protection across human and non-human identities. By unifying visibility, secure privileged access, and real-time detection and response, CrowdStrike stops identity-driven attacks before they begin. Subscribe and stay updated!

Falcon Next-Gen SIEM & Onum: Real-Time Telemetry Control and Federated Search

Discover how Falcon Onum and Falcon Next-Gen SIEM work together to optimize telemetry upstream and enable federated search across hot and archived data. Reduce ingestion overhead, maintain full visibility, and investigate across multiple data stores from a single platform.

How CrowdStrike is Accelerating Exposure Evaluation as Adversaries Gain Speed

When a new vulnerability is disclosed, security leaders want to know whether they’re exposed. In many organizations, the answer still depends on scan cycles that lag behind exposure — an architectural delay. Adversaries are moving faster: The average eCrime breakout time fell to 29 minutes in 2025, and the fastest was only 27 seconds, the CrowdStrike 2026 Global Threat Report found.

Anthropic Claude Mythos Preview: The More Capable AI Becomes, the More Security It Needs

The Claude Mythos Preview matters for every enterprise. Frontier models raise the ceiling for both offense and defense. Our job is to make sure defenders hold the advantage. That is what we have always done. That is what we do today. Today, CrowdStrike is a founding member of Project Glasswing. Anthropic builds the model. CrowdStrike secures AI where it executes. That’s the division of labor the industry needs.

Can an Attack Start Without Malware? 82% of Attacks Do

What looks like a simple coding task can quickly turn into a real cyberattack. In this demo, we show how a modern malware-free attack works step by step. It starts with something that feels completely normal: a job interview and a small coding assignment. No suspicious files. No obvious malware. But once the script is executed, everything changes. You’ll see how adversaries use trusted tools like Git, Notepad, and Python to gain access, establish command and control, and move inside an environment without being detected at first.

Falcon for IT Supports Windows Secure Boot Certificate Lifecycle Management

Microsoft has announced the retirement of the Windows UEFI CA 2011 certificate and the transition to the Windows UEFI CA 2023 certificate, with hard enforcement beginning in 2026. This update is part of Microsoft’s ongoing effort to preserve the integrity of the Windows Secure Boot trust chain and ensure continued delivery of boot-level security updates. For enterprise IT teams, this is not simply a certificate replacement.

STARDUST CHOLLIMA Likely Compromises Axios npm Package

On March 31, 2026, a threat actor used stolen maintainer credentials to compromise the widely used HTTP client library Axios Node Package Manager (npm) package and deploy platform-specific ZshBucket variants. CrowdStrike Counter Adversary Operations attributes this activity to STARDUST CHOLLIMA with moderate confidence based on the adversary’s deployment of updated variants of ZshBucket (malware uniquely attributed to STARDUST CHOLLIMA) and overlaps with known STARDUST CHOLLIMA infrastructure.