The crowdstrike incident: Analysis and unveiling the intricacies of modern cybersecurity breaches
Cognizant Technology Solutions Doha Qatar.
Review
World Journal of Advanced Engineering Technology and Sciences, 2024, 13(01), 728–733.
Article DOI: 10.30574/wjaets.2024.13.1.0473
Publication history:
Received on 23 August 2024; revised on 05 October 2024; accepted on 07 October 2024
Abstract:
The CrowdStrike incident is also helpful in evaluating the understanding of who is defending from cyber-attacks and what methods are being used. This pen works on the deep understanding of how this attack was performed, how the adversary detailed it step by step, what TTPs were used, and what an APT is at all. Deconstructing the CrowdStrike incident, this research shows how intruders implant themselves in the enterprise network and how this intrusion can be repelled or at least made less impactful towards preemptive security measures, real time threat intelligence, and effective response actions. This study also looks into how machine learning and AI based tools respond to and prevent cyber-attacks. Conclusions indicate progress and attacks in cyberspace, and the need for new approaches in protection of systems from such incidents.
Keywords:
CrowdStrike Incident; Cybersecurity breaches; Advanced persistent threats (APT); Threat intelligence; Vulnerability exploitation; Data breaches
Full text article in PDF:
Copyright information:
Copyright © 2024 Author(s) retain the copyright of this article. This article is published under the terms of the Creative Commons Attribution Liscense 4.0