iIT Distribution is the official distributor of Lookout
iIT Distribution expands its portfolio with networking solutions from Aruba Networks
IIT Distribution received the status of a Business Partner in the Hewlett Packard Enterprise affiliate program
Why should hosting providers pay attention to Infinidat data storage solution? Practical experience of use
The ZTNA model helps reduce the stress loading of employees from remote work
Сrowdstrike named leader in security Threat Detection, Response and Investigation of cyberincidents (MDMR)!
Falcon X від CrowdStrike визнаний лідер у звіті Forrester Wave: External Threat Intelligence Services за перший квартал 2021 року!
New Forrester study shows all the economic benefits of using the Falcon Complete!
iITD is the official partner of the International Grand Forum "BIT & BIS-2021"!
CrowdStrike has announced the acquisition of Humio's leading high-performance log management platform!
Intelligent IT Distribution at the international conference "Go Digital - 2021: acceleration and migration. Money goes online".
International Conference "Go Digital - 2021: acceleration and migration. Money goes online".
Crowdstrike's response to recent supply chain attacks
Intelligent IT Distribution takes part in the third annual international forum "Cybersecurity - protect business, protect the state"
IITD - partner of the forum "Cybersecurity - protect business, protect the country" 2020
iIT Distribution got the status of a distributor of Netbrain technologies solutions in the territory of Ukraine
Fal.Con 2020 by CrowdStrike
Compliance with cyberrisk insurance
Automatically block compartment accounts with Lepide Active Directory Self Service 20.1
Cossack Labs invites you to visit NONAMECON
Signing a distribution agreement with SAFE-T
International Conference "Online Banking - Time of Innovation!"
Global Cyber Threat Report 2020
Thursday, the 25-th of June, 2020. Do not miss!
PandaLabs Report: Understanding Threats 2020
Announcement: New version of ACRA Enterprise, which provides increased flexibility for high-loaded systems
Lepide Remote Worker Monitoring Pack is a simple in deployment and lightweight security platform, which offers immediate protection of business data during an unforeseen period of remote work.
Ensuring cybersecurity for remote users
Labyrinth Technologies offers to take advantage of a special offer - a license for 12 months at a price of 6 months
Crowdstrike: Remote work and IT security during the crisis - a reduced licensed program for 3-6 months
IIT Distribution received the status of distributor solutions RedSeal Networks in Ukraine
IIT DISTRIBUTION has received the status of a Lepide solutions distributor in Ukraine
You have probably heard the latest news that attackers have used SolarWinds software to access corporate networks of many large institutions around the world.
An important signal is that after this kink, SolarWinds became a customer of CrowdStrike. This is a special message to our partners to keep you updated.
The recent high-profile disclosure of a supply chain attack on software by advanced attackers made it clear that identity-centric attacks are now an integral part of the kinks. Attacks that exploit this type of vulnerability, based on the use of "lateral movement" for further actions when performing penetrations. In doing so, they use valid credentials to access the victim's corporate network, as this approach leaves fewer traces of presence. In fact, after attackers gain access to the victim's network, the attack uses multiple credentials, making it even more difficult to detect.
HOW DOES CROWDSTRIKE PROTECT CUSTOMERS?
The most important thing to know is that CrowdStrike clients are protected from recent attacks! The CrowdStrike Intelligence Team obtained various trojanized binaries and reverse engineering them for additional details, including Indicators of Compromise (IOC) and Indicators of Attack (IOA), in addition to those publicly disclosed. All harmful hostnames, IP addresses, URLs, binary hashes, registry keys and other IOCs have been added to CrowdStrike ThreatGraph. CrowdStrike analysts have added two dozen new IOAs to detect tradecraft, signaling real host compromise, as opposed to detecting the simple presence of trojanized modules. In addition, the company has deployed various tools and capabilities on the Falcon platform to help facilitate the identification of potentially affected hosts, in particular:
- A new SUNBURST vulnerability dashboard that identifies hosts with IOCs associated with this vulnerability, including the ability to inspect, endpoint devices have compromised files in the last 90 days.
- The scorecard allows customers to determine if there has been evidence of file or host damage over the past year.
- Finally, customers can see Sunburst IOC detections on hosts with Cloud ML detection enabled.
CrowdStrike launched the Sunburst public information site so that organizations can learn how to avoid the harmful effects of this fracture. This website provides information on how organizations can determine if they are not compromised, what can be done to remediate breaches, and how to protect infrastructure.
Please refer your clients to the Resource Center CrowdStrike,
https://www.crowdstrike.com/sunburst/ to learn more about how they can protect their corporate network from the threat Sunburst.