
Sign up to save your podcasts
Or
The CrowdStrike 2024 Threat Hunting Report analyzes the evolving cyber threat landscape over the past year. It highlights the rise of stealthy, cross-domain attacks targeting identity, endpoints, and cloud environments. The report emphasizes the increasing use of legitimate tools like RMM software by adversaries for malicious purposes and insider threats exploiting recruitment processes. CrowdStrike's OverWatch team uses threat intelligence, AI, and proactive hunting to detect and disrupt these advanced threats, ultimately strengthening the Falcon platform's defenses. Case studies illustrate real-world examples of adversaries like SCATTERED SPIDER and FAMOUS CHOLLIMA, and detail the tactics used to counter them.
The CrowdStrike 2024 Threat Hunting Report analyzes the evolving cyber threat landscape over the past year. It highlights the rise of stealthy, cross-domain attacks targeting identity, endpoints, and cloud environments. The report emphasizes the increasing use of legitimate tools like RMM software by adversaries for malicious purposes and insider threats exploiting recruitment processes. CrowdStrike's OverWatch team uses threat intelligence, AI, and proactive hunting to detect and disrupt these advanced threats, ultimately strengthening the Falcon platform's defenses. Case studies illustrate real-world examples of adversaries like SCATTERED SPIDER and FAMOUS CHOLLIMA, and detail the tactics used to counter them.