CrowdStrike | Other |

CrowdStrike Launches FalconID, Bringing Phishing-Resistant MFA to Next-Gen Identity Security

CrowdStrike announced the launch of FalconID, a new offering for its Falcon Next-Gen Identity Security platform. The core of this solution is to provide phishing-resistant multi-factor authentication (MFA), addressing security vulnerabilities in traditional MFA methods (like SMS or push notifications) such as credential theft and man-in-the-middle attacks. FalconID leverages the FIDO2/WebAuthn standard, supporting passwordless login via physical security keys or built-in platform authenticators (e.g., Windows Hello or Touch ID), thereby eliminating the risk of passwords and phishable credentials at the source. The product is deeply integrated with the CrowdStrike Falcon platform, utilizing its threat intelligence and detection capabilities to provide context-aware and risk-based analysis for the authentication process. This move signifies CrowdStrike's expansion of its endpoint security strengths into the identity protection domain, aiming to deliver comprehensive security from endpoint to identity. <b>Comment</b>: The launch of FalconID is a key step in CrowdStrike's strategy to build a unified security platform. Its adoption of the FIDO2 standard and provision of contextual risk analysis directly target current pain points in identity security, offering clear value for enterprises seeking to strengthen zero-trust architecture and defend against sophisticated phishing attacks.

2026-02-26 14:00
CrowdStrike | Other |

Threat Actors Master Typosquatting Campaigns to Bypass Detection

CrowdStrike's threat intelligence team has released a report detailing how threat actors are refining "typosquatting" attack techniques to evade traditional security detection. The report reveals that attackers are moving beyond simple spelling mistakes to employ more sophisticated tactics. These include using homoglyphs (visually similar characters, such as the Latin 'a' vs. the Cyrillic 'а'), adding hyphens or dots, and registering subdomains that closely mimic target brands. These methods aim to deceive both users and automated systems into believing they are visiting legitimate websites. CrowdStrike observes that such attacks are often used for initial access, tricking users into downloading malware by impersonating software updates, internal tools, or partner websites. Attackers leverage automated tools for large-scale scanning and registration of available domains and frequently rotate their attack infrastructure to prolong campaign lifecycles and evade reputation-based blocking. **Comment**: This report highlights the cutting-edge evolution of phishing and supply chain attack techniques, underscoring the insufficiency of defense strategies relying solely on traditional domain blacklists or simple string matching. Organizations should enhance employee security awareness training and deploy next-generation security solutions capable of glyph analysis, behavioral detection, and contextual correlation to counter such highly evasive social engineering attacks.

2026-02-23 14:00