Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Shadow IT: What Are the Risks and How Can You Mitigate Them?

Using unapproved tools, software, and devices poses a significant risk to your organization. You never know what vulnerabilities so-called “shadow IT” may introduce, leaving your sensitive data and systems exposed to potential threats. In this article, we define the term shadow IT and explore several reasons why employees use unapproved software.

Data Leaks and AI Agents: Why Your APIs Could Be Exposing Sensitive Information

Most organizations are using AI in some way today, whether they know it or not. Some are merely beginning to experiment with it, using tools like chatbots. Others, however, have integrated agentic AI directly into their business procedures and APIs. While both types of organizations are undoubtedly realizing remarkable productivity and efficiency benefits, they may not know they are putting themselves at a significant security risk.

A litmus test for AI agents

What is an ”AI agent”? Confusion abounds. There is also some consensus: agents must of course be AI-driven systems. They should have some degree of autonomy, and they should be able to use tools in addition to understanding and reasoning. But why isn't, say, ChatGPT an agent? According to most definitions out there, it actually is. Yet most (including OpenAI themselves) don’t describe it that way.

Announcing a new joint product offering from Tines and Elastic

Today, we’re excited to share that Tines Workflow Automation is now available directly through Elastic. Countless mutual customers already benefit from combining Tines' orchestration and automation capabilities with Elastic Security and Observability, allowing them to strengthen defenses, ensure operational resilience, and maximize the return on their existing investments.

CrowdStrike Achieves FedRAMP High Authorization

The evolving landscape of state-sponsored threats demands the highest levels of security for federal systems and critical infrastructure. As part of our longstanding commitment to protecting federal agencies and critical infrastructure, the AI-native CrowdStrike Falcon platform has achieved Federal Risk and Authorization Management Program (FedRAMP) High Authorization — the U.S. government’s most stringent cloud security standard.

Follow the Adversary: The Top 3 Red Team Exploitation Paths from 2024

Though 2024 may be behind us, many of the security threats and vulnerabilities that organizations faced last year remain. The CrowdStrike Professional Services Red Team tracks them all in its efforts to defend organizations against adversaries. The three most common exploitation paths we encountered were: In this blog, we break down these three critical exploitation paths, detailing how they occur and what steps organizations can take to mitigate them.

Be Vigilant: BEC Attacks Are on the Rise

Business email compromise (BEC) attacks rose 13% last month, with the average requested wire transfer increasing to $39,315, according to a new report from Fortra. “The average amount requested from BEC wire transfer attackers was $39,315 in February compared to $24,586 in January 2025, an increase of 60%,” the report says.

How to Improve Your Security Posture with the Least Effort Using ASPM

Security posture management has become exponentially more complex for organizations developing and managing a vast ecosystem of applications. Evolving architectures like microservices, hybrid cloud infrastructures, and frequent release cycles introduce constant change and challenges. Amid these growing challenges are the existing security gaps organizations are struggling to address.

Zero-day vulnerabilities: the real threat behind Netflix's "Zero Day"

Imagine a hidden flaw in software that no one—except cybercriminals—knows about. A zero-day vulnerability is exactly that: a security weakness that hasn’t been discovered or patched by developers. Because there’s no fix, attackers can exploit these flaws before anyone has a chance to defend against them.