CYBERSECURITY
WATCH NOW
See Falcon Endpoint security in action
Falcon employs a cloud-native architecture that uses behavioural analysis and machine learning to identify and prevent sophisticated attacks across endpoints, cloud environments and identity management systems.
The company expanded its capabilities through strategic acquisitions, including Preempt Security for US $ 96m in 2020, which enhanced its identity protection capabilities, and Humio for US $ 400m in 2021, which strengthened its log management and observability offerings.
CrowdStrike has steadily broadened its product portfolio beyond endpoint protection to include cloud security, identity protection, security operations and threat intelligence services.
The Falcon platform architecture enables customers to deploy additional modules without installing new agents, creating a competitive advantage against traditional security vendors that often require multiple products and agents.
CrowdStrike research highlights Chinese cyber espionage campaign The company’ s 2025 Global Threat Report, released in February, documented a 150 % surge in
Chinese cyber espionage operations, with targeted attacks against financial services, media and manufacturing sectors increasing by up to 300 %.
CrowdStrike’ s threat intelligence team, which tracks more than 250 named adversaries and 140 emerging activity clusters, identified seven new China-nexus adversaries in 2024 alone.
The report revealed a significant shift in attack methods, with 79 % of initial access breaches now classified as malware-free, relying instead on stolen credentials to infiltrate systems as legitimate users.
“ China’ s increasingly aggressive cyber espionage, combined with the rapid weaponisation of AI-powered deception, is forcing organisations to rethink their approach to security,” says Adam Meyers, Head of Counter Adversary Operations at CrowdStrike. The average time for criminals to move laterally within a network after initial breach – known as“ breakout time” – has dropped to 48 minutes, with the fastest recorded at 51 seconds, according to the report.
This rapid movement coincides with a 442 % increase in voice phishing between the first and second halves of 2024, driven by social engineering tactics.
Criminal groups including CURLY SPIDER, CHATTY SPIDER and PLUMP SPIDER have leveraged these techniques to steal credentials, establish remote sessions and bypass traditional detection methods.
technologymagazine. com 141