Attacker breakout time falls to 18 minutes, says CrowdStrike report

A recent report by CrowdStrike reveals a significant reduction in attacker breakout time within enterprise networks, now averaging just 18 minutes. This rapid progression from initial compromise to lateral movement highlights the increasing sophistication and speed of cyber threats. The report emphasizes the critical need for organizations to enhance their detection and response capabilities to mitigate the impact of breaches effectively. It also underscores the importance of proactive threat hunting and continuous monitoring to identify malicious activities early. CrowdStrike's findings serve as a wake-up call for cybersecurity teams to prioritize rapid incident response and strengthen their security posture against evolving attacker tactics. The report further discusses the role of automation and AI in accelerating threat detection and containment, enabling defenders to keep pace with agile adversaries. As attacker dwell times shrink, organizations must adopt a multi-layered defense strategy, integrating endpoint protection, network security, and threat intelligence to reduce risk exposure. This comprehensive analysis provides valuable insights for security professionals aiming to improve their resilience against fast-moving cyber attacks.

This Cyber News was published on www.infosecurity-magazine.com. Publication date: Tue, 23 Sep 2025 10:15:03 +0000


Cyber News related to Attacker breakout time falls to 18 minutes, says CrowdStrike report

Generative AI Takes on SIEM - With more vendors adding support for generative AI to their platforms and products, life for security analysts seems to be getting deceptively easier. While adding generative AI capabilities to security information and event management is still in ...
2 years ago Darkreading.com
Attacker breakout time falls to 18 minutes, says CrowdStrike report - A recent report by CrowdStrike reveals a significant reduction in attacker breakout time within enterprise networks, now averaging just 18 minutes. This rapid progression from initial compromise to lateral movement highlights the increasing ...
3 months ago Infosecurity-magazine.com
CrowdStrike Demonstrates Cloud Security Leadership at AWS re:Invent - CrowdStrike is honored to be named Partner of the Year for several 2023 Geo and Global AWS Partner Awards at Amazon Web Services re:Invent 2023, where we are participating this year as a Diamond Sponsor. These accomplishments demonstrate our ...
2 years ago Crowdstrike.com
Privilege elevation exploits used in over 50% of insider attacks - Elevation of privilege flaws are the most common vulnerability leveraged by corporate insiders when conducting unauthorized activities on networks, whether for malicious purposes or by downloading risky tools in a dangerous manner. A report by ...
2 years ago Bleepingcomputer.com CVE-2017-0213
CVE-2025-1146 - CrowdStrike uses industry-standard TLS (transport layer security) to secure communications from the Falcon sensor to the CrowdStrike cloud. CrowdStrike has identified a validation logic error in the Falcon sensor for Linux, Falcon Kubernetes ...
10 months ago Tenable.com
CrowdStrike Enhances Cloud Asset Visualization to Accelerate Risk Prioritization - The massive increase in cloud adoption has driven adversaries to focus their efforts on cloud environments - a shift that led to cloud intrusions increasing by 75% in 2023, emphasizing the need for stronger cloud security. As organizations increase ...
1 year ago Crowdstrike.com
Adobe Real-Time CDP: Personalized Customer Experience - Adobe Experience Cloud Products like Adobe Real-Time CDP are available to assist. A revolutionary solution called Adobe Real-Time Customer Data Platform was created to assist companies in realizing the whole value of their customer data. Adobe ...
2 years ago Hackread.com
We're upgrading CrowdStrike despite a post-earnings stock drop - CrowdStrike, a leading cybersecurity firm, recently experienced a stock drop following its earnings report. Despite this, analysts have upgraded their outlook on the company, citing strong fundamentals and growth potential in the cybersecurity ...
4 months ago Cnbc.com
Researchers Bypassed CrowdStrike Falcon Sensor to Execute Malicious Applications - Security researchers at SEC Consult have discovered a significant vulnerability in CrowdStrike’s Falcon Sensor that allowed attackers to bypass detection mechanisms and execute malicious applications. The researchers at SEC Consult found that ...
9 months ago Cybersecuritynews.com
CrowdStrike to Buy AI Security Company Pangea - CrowdStrike, a leading cybersecurity firm, has announced its acquisition of Pangea, an AI-driven security company. This strategic move aims to enhance CrowdStrike's capabilities in artificial intelligence and machine learning to better detect and ...
3 months ago Wsj.com
Rootkit Turns Kubernetes from Orchestration to Subversion - As software development focuses on continuous integration and deployment, orchestration platforms like Kubernetes have taken off, but that popularity has put them in attackers' crosshairs. Most successful attacks - at least those publicly reported - ...
2 years ago Darkreading.com
CrowdStrike Set to Acquire Onum - CrowdStrike, a leading cybersecurity technology company, is set to acquire Onum, a firm specializing in cloud security and compliance solutions. This strategic acquisition aims to enhance CrowdStrike's cloud security capabilities, providing customers ...
3 months ago Cybersecuritynews.com
PowerSchool previously hacked in August, months before data breach - Although the company has not officially disclosed the number of people impacted by this incident, BleepingComputer first reported that the threat actor claimed to have stolen the data of 72 million people, including students and teachers. In that ...
9 months ago Bleepingcomputer.com
Former Uber CISO Speaks Out, After 6 Years, on Data Breach, SolarWinds - Joe Sullivan arrived at his sentencing hearing on May 4 this year, prepared to go to jail had the judge not gone with a parole board's recommendation of probation. A federal jury convicted the former Uber CISO months earlier on two charges of fraud ...
2 years ago Darkreading.com
9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
2 years ago Esecurityplanet.com
Seraphic Browser Native Protection Now Available for Purchase on the CrowdStrike Marketplace - Seraphic Security has announced that its Seraphic Browser Native Protection is now available for purchase on the CrowdStrike Marketplace. This integration allows organizations to enhance their endpoint security by leveraging Seraphic's advanced ...
3 months ago Cybersecuritynews.com
CrowdStrike Falcon Sensor for Linux TLS Vulnerability Enabling MiTM Attack - The vulnerability affects versions of the Falcon Sensor for Linux and related components prior to version 7.06. The issue arises from incorrect processing of server certificates during TLS communication with the CrowdStrike cloud. CrowdStrike has ...
10 months ago Cybersecuritynews.com CVE-2025-1146
Ransomware Attacks Strike South Africa, Decline in UAE - Cybercrime - and especially ransomware - traditionally have had an uneven impact across the Middle East and Africa, yet recent data suggests that ongoing geopolitical conflicts will likely raise the overall level of cyberattacks across the regions. ...
2 years ago Darkreading.com Molerats LockBit
Microsoft March 2025 Patch Tuesday fixes 7 zero-days, 57 flaws - Microsoft says that this remote code execution vulnerability is caused by an integer overflow or wraparound in Windows Fast FAT Driver that, when exploited, allows an attacker to execute code. Microsoft says that this remote code execution ...
9 months ago Bleepingcomputer.com
Over 90% of Cybersecurity Leaders Worldwide Encountered Cyberattacks Targeting Cloud Environments - To counter this growing threat, the report recommends organizations adopt a comprehensive strategy that includes improved visibility into cloud environments, identity protection measures, and robust backup capabilities that mirror the rigor ...
7 months ago Cybersecuritynews.com
What's new in the MSRC Report Abuse Portal and API - The Microsoft Security Response Center has always been at the forefront of addressing cyber threats, privacy issues, and abuse arising from Microsoft Online Services. Building on our commitment, we have introduced several key updates to the Report ...
1 year ago Msrc.microsoft.com
What CISOs Should Exclude From SEC Cybersecurity Filings - As enterprises continue to weigh which security incidents constitute something material enough to be reported under the Securities and Exchange Commission's new rules, CISOs face the challenge of deciding which details to report and, far more ...
2 years ago Darkreading.com
Helping to keep the lights on in Ukraine in the face of electronic warfare - Ukraine's high-voltage electricity substations rely on GPS for time synchronization. Many of Ukraine's high-voltage electrical substations - which play a vital role in the country's domestic transmission of power - make extensive use of the ...
2 years ago Blog.talosintelligence.com
Google Cloud Report Spotlights 2024 Cybersecurity Challenges - As the New Year dawns, a cybersecurity report from Google Cloud suggests that while there are many challenges ahead, it will also become simpler for cybersecurity teams to leverage artificial intelligence to better defend IT environments. John ...
1 year ago Securityboulevard.com
Falcon Cloud Security Supports Google Cloud Run to Strengthen Serverless Application Security - We're thrilled to share that the CrowdStrike Falcon® sensor now fully supports Google Cloud Run, bringing advanced security capabilities to your serverless applications. While we announced this at Google Cloud Next in April 2024, this blog goes ...
1 year ago Crowdstrike.com