Learn the tactics, techniques, procedures and compromises in the cloud of China-based adversary MURKY PANDA. Learn more.| www.crowdstrike.com
Stop by CrowdStrike's cybersecurity resource library for an in-depth selection of free materials on endpoint security and the CrowdStrike Falcon® platform.| www.crowdstrike.com
The DPRK group’s attempts to exfiltrate data and install RMM tools by posing as US IT workers is one of several examples that show cross-domain analysis is needed to tackle rising identity-based attacks, according to CrowdStrike’s counter adversary team, as the company reels in the worldwide outage’s wake.| CSO Online