About 20 results
Open links in new tab
  1. Cutwail Spam Campaign Uses Steganography to Distribute URLZone

    CrowdStrike analyzed a new Cutwail spam campaign from NARWHAL SPIDER that uses digital steganography to distribute URLZone.

  2. 2025 Global Threat Report - CrowdStrike

    Discover key cyber threat trends in CrowdStrike’s 2025 Global Threat Report. Learn about rising attacks, malware-free threats, and evolving adversary tactics. Download the report now.

  3. Malware Analysis: Steps & Examples | CrowdStrike

    Malware analysis is the process of understanding the behavior and purpose of a malware sample to prevent future cyberattacks.

  4. CrowdStrike Extends Identity Security Capabilities to Stop Attacks in ...

    Learn how a failure to secure cloud identities can result in a breach and how recently released innovations in CrowdStrike Falcon® Identity Protection can stop identity attacks in the cloud.

  5. Malicious Spear-Phishing Campaign Targets Upcoming Winter …

    Jan 10, 2018 · Open source reporting indicates this campaign used several sophisticated techniques, such as an in-memory implant using PowerShell scripts, along with a newly released steganography …

  6. Identity Protection: What It Is and Why You Need It | CrowdStrike

    Identity protection is a comprehensive solution that protects all types of identities to detect & prevent identity-driven breaches.

  7. Adversary Quest 2021: 4 SPACE JACKAL Hacktivist Challenges

    This is a steganography challenge that also requires skills in reverse engineering. Initial Analysis The challenge consists of a file proclamation.dat. This file (512 byte) contains a simple self-written …

  8. What is Data Obfuscation? | CrowdStrike

    Data obfuscation is the process of disguising confidential or sensitive data to protect it from unauthorized access.

  9. What are Honeytokens? - CrowdStrike

    Honeytokens are digital resources that are purposely designed to be attractive to an attacker, but signify unauthorized use. Learn more!

  10. What is a Pass-the-Hash Attack? | CrowdStrike

    Pass the hash is a type of cybersecurity attack in which an adversary steals a “hashed” user credential and uses it to create a new user session on the same network.