
adam_cyber
@adam_cyber
I'm from the Internet and I'm here to help
ID: 31217450
14-04-2009 20:30:08
3,3K Tweet
5,5K Followers
398 Following



As I said last week before Congress, the security of our nation and of our allies’ depends on a strong public-private partnership. Today that is on full display in our work with Law Enforcement around the world to help indict more members of Indrik Spider: crowdstrike.com/en-us/blog/aut…

Today, a coalition incl. National Crime Agency (NCA) announced an indictment of a senior member of INDRIK SPIDER – also an affiliate of BITWISE SPIDER – as well as multiple sanctions against key members of INDRIK SPIDER. #CrowdStrike has tracked INDRIK SPIDER since 2010 and provided critical threat


This was a fun podcast with Alex Ionescu discussing all things kernel: podcasts.apple.com/us/podcast/adv…

SwiftOnSecurity Yes. Something very recent at a client. North Korean or Chinese agent, hired as a Sr Software Engineer. Crowdstrike OverWatch noticed they were connecting with an IP associated with a confirmed laptop farm that was part of Famous Chollima.


Today US DOJ unsealed an indictment against two Sudanese men accused of orchestrating the Anonymous Sudan hacktivist group. This is a huge win for the good guys and I’m proud of the CrowdStrike CAO team for their part supporting this effort! crowdstrike.com/en-us/blog/ano…



Read the full story from CRN's Kyle Alspach, who interviewed CrowdStrike's adam_cyber about our recent unveiling of LIMINAL PANDA: crwdstr.ke/6012shfx2



Tune in to the latest episode of the Adversary Universe podcast, where our co-hosts adam_cyber and Cristian Rodriguez unpack the discipline of cross-domain threat hunting ⏯️ Spotify: open.spotify.com/episode/2ARtM4… ⏯️ Apple Podcasts: podcasts.apple.com/us/podcast/adv…


🚨CrowdStrike's Adam Meyers details for Rep. Mark Green how the Chinese Communist Party resources its efforts to infiltrate our networks: "[China] has nationalized their vulnerability research program...so they can use that for exploits against American tech & American companies."

👉 China’s offensive cyber activity has undergone a massive shift: What used to be simple smash-and-grab operations in the mid-2000s have evolved into sophisticated business models. Co-hosts adam_cyber and Cristian Rodriguez unpack this on our podcast: crwdstr.ke/6017xBrpD



FAMOUS CHOLLIMA sustained high ops tempo throughout April. CrowdStrike Falcon OverWatch tracked 55+ incidents split between malware deployment and remote IT worker activity. This actor continues to adapt tradecraft and scale operations. Organizations must remain vigilant.

Proud to share that CrowdStrike partnered with the U.S. Department of Justice to disrupt the operators behind the prolific DanaBot malware. This operation is another win for public-private collaboration! crowdstrike.com/en-us/blog/cro…