
Cutwail Spam Campaign Uses Steganography to Distribute URLZone
CrowdStrike analyzed a new Cutwail spam campaign from NARWHAL SPIDER that uses digital steganography to distribute URLZone.
2025 Global Threat Report - CrowdStrike
Discover key cyber threat trends in CrowdStrike’s 2025 Global Threat Report. Learn about rising attacks, malware-free threats, and evolving adversary tactics. Download the report now.
Malware Analysis: Steps & Examples | CrowdStrike
Malware analysis is the process of understanding the behavior and purpose of a malware sample to prevent future cyberattacks.
CrowdStrike Extends Identity Security Capabilities to Stop Attacks in ...
Learn how a failure to secure cloud identities can result in a breach and how recently released innovations in CrowdStrike Falcon® Identity Protection can stop identity attacks in the cloud.
Malicious Spear-Phishing Campaign Targets Upcoming Winter …
Jan 10, 2018 · Open source reporting indicates this campaign used several sophisticated techniques, such as an in-memory implant using PowerShell scripts, along with a newly released steganography …
Identity Protection: What It Is and Why You Need It | CrowdStrike
Identity protection is a comprehensive solution that protects all types of identities to detect & prevent identity-driven breaches.
Adversary Quest 2021: 4 SPACE JACKAL Hacktivist Challenges
This is a steganography challenge that also requires skills in reverse engineering. Initial Analysis The challenge consists of a file proclamation.dat. This file (512 byte) contains a simple self-written …
What is Data Obfuscation? | CrowdStrike
Data obfuscation is the process of disguising confidential or sensitive data to protect it from unauthorized access.
What are Honeytokens? - CrowdStrike
Honeytokens are digital resources that are purposely designed to be attractive to an attacker, but signify unauthorized use. Learn more!
What is a Pass-the-Hash Attack? | CrowdStrike
Pass the hash is a type of cybersecurity attack in which an adversary steals a “hashed” user credential and uses it to create a new user session on the same network.