Modern adversaries are relentless. Today’s threat actors target organizations around the world with sophisticated cyberattacks. Who are they? What are they after? And most importantly, how can you defend against them? Welcome to the Adversary Universe podcast, where CrowdStrike answers all of these questions — and more. Join our hosts, a pioneer in adversary intelligence and a specialist in cybersecurity technology, as they unmask the threat actors targeting your organization.
In mid-December 2023, an adversary CrowdStrike tracks as VOODOO BEAR targeted Ukrainian telecom provider Kyivstar, wreaking havoc and disrupting thousands of systems and assets.
The Russia-linked ad…
It has been a whirlwind year for the cybersecurity industry.
In this episode of the Adversary Universe podcast, we revisit clips from standout episodes of 2023. Tune in to catch pieces of our conver…
Organizations around the world must navigate a growing number of cyber incident reporting regulations mandated by government bodies.
In the U.S., these regulations come from agencies including the S…
Today’s adversaries are working smarter, not harder — and it’s clear in the way their tactics are evolving.
In this episode, Adam and Cristian explore the way adversaries are shifting their focus to…
At a time when breaches make headlines daily, the healthcare sector is among the most popular adversary targets.
Cyberattacks against healthcare organizations have spiked in recent years, disrupting…
“Iran’s digital presence is something we don’t want to underestimate.”
Though its cyber activity has been making headlines during a dynamic past few weeks, Iran’s history as a major player in the th…
China is the source of some of the most prolific and aggressive nation-state cyber activity organizations face.
Every business vertical, across every geography, is affected by China’s unrelenting fo…
A cyberattack is any security team’s worst nightmare — but the earlier a breach is detected, the faster you can respond and mitigate the damage.
In this episode, we’ll share the warning signs that c…
When an adversary seeks entry into an organization, they no longer need to develop their own vulnerability exploits or steal credentials.
Many turn to access brokers, the sellers of credentials, exp…
Adversaries are moving and innovating at a rapid pace — but so are we.
In this bonus episode, Adam and Cristian chat about the biggest announcements from Fal.Con, CrowdStrike’s annual conference, wh…
Artificial intelligence. It’s the hot topic in cybersecurity today.
Everyone is curious about it, excited about its use cases and nervous about the problems it may cause in the wrong hands. Adam and…
School is back in session — and adversaries have already done their homework.
They know educational institutions often lack the resources and expertise to keep up with the wave of ransomware, data e…
Vulnerabilities are the unlocked doors allowing adversaries a foothold into your organization.
Left unpatched, they provide an entryway for intruders to break in, move laterally and wreak havoc. Thi…
“Scary and incredible.” “Terrifying.”
Adam and Cristian dig into new data from CrowdStrike’s recently formed Counter Adversary Operations Unit. A new report reveals adversaries are growing faster an…
Multiple U.S. government agencies were recently breached after adversaries exploited vulnerabilities in Microsoft’s Azure Active Directory. With Microsoft vulnerabilities at the heart of some of the …
Most organizations rely on cloud services or infrastructure to power their day-to-day operations — and adversaries know it. In this episode, we’ll explore how threat actors use the cloud to their adv…
Behind every cyberattack, there is an adversary. These adversaries target organizations large and small, across all industries, to steal money, information and more from their victims.
Understanding …
Welcome to the Adversary Universe podcast, the best place to learn about the threat actors behind today’s cyberattacks.
We’ll dig deep into the adversaries we’re tracking here at CrowdStrike, the tac…