CrowdStrike is expanding the capabilities of CrowdStrike Falcon® Data Protection and introducing a new offering, SaaS Threat Services, enabling security teams to protect sensitive data across endpoints, cloud environments, and GenAI and SaaS applications. Today’s adversaries are targeting data wherever it resides. As GenAI adoption accelerates, misconfigured applications … [Read more...] about CrowdStrike Strengthens Data Security Across Endpoint, Cloud, and SaaS Applications
cloud
CrowdStrike and Google Cloud Advance AI-Native Integration with MCP
CrowdStrike has joined Google Cloud in a shared commitment to foster an open and interoperable AI security ecosystem through the Model Context Protocol (MCP), which is built to transform how AI models interact with cybersecurity platforms. This collaboration will enable seamless integration between the CrowdStrike Falcon® cybersecurity platform and AI models through … [Read more...] about CrowdStrike and Google Cloud Advance AI-Native Integration with MCP
Announcing general availability of Elastic Cloud Serverless on Google Cloud
Elastic Cloud Serverless provides the fastest way to start and scale security, observability, and search solutions — without managing infrastructure. Today, we are excited to announce the general availability of Elastic Cloud Serverless on Google Cloud — now available in the Iowa (us-central1) region. Elastic Cloud Serverless provides the fastest way to start and scale … [Read more...] about Announcing general availability of Elastic Cloud Serverless on Google Cloud
Falcon Cloud Security Adds New AWS Detections
CrowdStrike Falcon® Cloud Security now delivers real-time detections for AWS IAM Identity Center, helping organizations detect and respond to identity-driven cloud threats before they escalate. A few months ago, we released CrowdStrike Falcon® Identity Protection support for AWS IAM Identity Center to help organizations detect and stop identity-based attacks before they … [Read more...] about Falcon Cloud Security Adds New AWS Detections
Essential Components of a Cloud Runtime Protection Strategy
Securing cloud environments at runtime is no easy feat. Unlike traditional infrastructure, cloud workloads are dynamic, ephemeral, and often span multiple platforms — making continuous visibility a moving target. Adversaries continue to set their sights on cloud: According to the CrowdStrike 2025 Global Threat Report, new and unattributed cloud intrusions were up 26% … [Read more...] about Essential Components of a Cloud Runtime Protection Strategy
Cisco Secure Client’s Cloud Transformation
It started over 16 years ago. Cisco Secure Client, then known as AnyConnect, quickly rose to prominence as the go-to VPN solution for organizations worldwide. It became synonymous with reliable, secure remote connectivity, helping businesses bridge the gap between their teams and the resources they needed. But technology never stands still. As threats evolved and workforces … [Read more...] about Cisco Secure Client’s Cloud Transformation
CrowdStrike Wins Google Cloud Security Partner of the Year Award
CrowdStrike has won the 2025 Google Cloud Security Partner of the Year Award for Workload Security, recognizing our leadership in securing cloud environments at scale. Announced at Google Cloud Next 2025, the award highlights our commitment to joint innovation and delivering best-in-class protection for Google Cloud customers. As part of this growing partnership, we also … [Read more...] about CrowdStrike Wins Google Cloud Security Partner of the Year Award
Google Fixed Cloud Run Vulnerability Allowing Unauthorized Image Access via IAM Misuse
Apr 02, 2025Ravie LakshmananCloud Security / Vulnerability Cybersecurity researchers have disclosed details of a now-patched privilege escalation vulnerability in Google Cloud Platform (GCP) Cloud Run that could have allowed a malicious actor to access container images and even inject malicious code. "The vulnerability could have allowed such an identity to abuse its Google … [Read more...] about Google Fixed Cloud Run Vulnerability Allowing Unauthorized Image Access via IAM Misuse
Falcon Cloud Security Identifies AI-Driven Packages in Container Images
Artificial intelligence (AI) is rapidly transforming industries, but with this innovation come new security challenges as threat actors explore AI’s powerful capabilities. They’re adopting new techniques, targeting AI models, injecting malicious code into AI processes, and exploiting vulnerabilities in AI-related software packages. Malicious AI-related software packages … [Read more...] about Falcon Cloud Security Identifies AI-Driven Packages in Container Images
Malicious PyPI Packages Stole Cloud Tokens—Over 14,100 Downloads Before Removal
Mar 15, 2025Ravie Lakshmanan Malware / Supply Chain Security Cybersecurity researchers have warned of a malicious campaign targeting users of the Python Package Index (PyPI) repository with bogus libraries masquerading as "time" related utilities, but harboring hidden functionality to steal sensitive data such as cloud access tokens. Software supply chain security firm … [Read more...] about Malicious PyPI Packages Stole Cloud Tokens—Over 14,100 Downloads Before Removal