CrowdStrike has released the 2025 Threat Hunting Report, highlighting a new phase in modern cyberattacks: adversaries are weaponizing GenAI to scale operations and accelerate attacks – and increasingly targeting the autonomous AI agents reshaping enterprise operations. The report reveals how threat actors are targeting tools used to build AI agentsRead More…

Cyber risk company Resilience Resilience, CrowdStrike and Amazon Web Services (AWS) have announced a new collaboration to empower enterprises to proactively mitigate cyber risk and minimize material losses from cyber incidents. Through tCyber Riskhis new partnership with CrowdStrike and expanded collaboration with AWS, customers can leverage the Resilience Threatonomics Platform toRead More…

As part of its ongoing commitment to enhancing cybersecurity in Kuwait, Gulf Bank has signed a Memorandum of Understanding (MoU) with CrowdStrike, a global leader in cybersecurity. The partnership aims to boost cybersecurity awareness, increase digital resilience within the business community, and develop local Kuwaiti talent in this vital field.Read More…

CrowdStrike has unveiled Falcon for AWS Security Incident Response at AWS re:Inforce 2025, a new program that provides AWS Security Incident Response customers with industry-leading cyber protection from the AI-native CrowdStrike Falcon cybersecurity platform at preferred rates in the AWS Marketplace. This program delivers AI-powered incident response to help organizations respond to incidents faster,Read More…

CrowdStrike has announced the integration of Falcon Cloud Security with NVIDIA universal LLM NIM microservices and NeMo Safety, delivering full lifecycle protection for AI and over 100,000 large language models (LLMs) in collaboration with NVIDIA. Expanding CrowdStrike’s protection for Enterprise AI Factories with NVIDIA, this new integration enables customers to safely run and scaleRead More…

CrowdStrike and Microsoft have announced a collaboration to bring clarity and coordination to how cyber threat actors are identified and tracked across security vendors. By mapping threat actor aliases and aligning adversary attribution across platforms, the collaboration minimizes confusion caused by different naming systems and accelerates cyber defenders’ response againstRead More…