Anonymous ID: 24f005 July 16, 2018, 7:07 p.m. No.2181649   🗄️.is 🔗kun

https://theantimedia.com/propornot-2017-biggest-fake-news-story/

 

2017’s Biggest Fake News Story: PropOrNot

 

According to Donna Brazille, the Democratic Party servers were hacked multiple times and the hacking didn’t stop until December 2016. At this juncture, we should be able to agree that Seth Rich leaked the information to Wikileaks. But, now we are talking about other hacks. In the above-linked article, these hacker specifically say their favorite route is spear phishing email accounts.

 

In the article, you’ll also see they work directly for Ukrainian Intel. Bellingcat works directly for Ukrainian Intel and works with them and the Atlantic Council. Stopfake.org is a product of Irena Chalupa who works for RFE/RL, the Atlantic Council and the Ukrainian government. Stopfake.org works directly with them and is a product of the Ukrainian government. Crowdstrike has an ongoing relationship with Ukrainian Intel and these particular hackers. Is it possible that Crowdstrike conjured up Fancy Bear, the “hacker(s)” responsible for divulging internal Democratic Party emails that supposedly tipped the 2016 election in Trump’s favor? (“Fancy Bear,” by the way, is technically a set of tools, not a person.)

 

If so, this would mean that approval was given at the highest levels – presumably former Secretary of State John Kerry – for Ukrainian intelligence hackers to have access to servers inside a U.S. Government Agency because of PropOrNot and the Atlantic Council’s reliance on the hackers.

Anonymous ID: 24f005 July 16, 2018, 7:20 p.m. No.2181814   🗄️.is 🔗kun

https://www.crowdstrike.com/resources/crowdstrike-closes-100-million-financing-round-led-google-capital/

 

CrowdStrike Closes $100 Million Financing Round Led by Google Capital

 

— Series C to further accelerate explosive growth; validates SaaS-based endpoint protection as the only path forward to address today’s pervasive cyber attacks —

 

Irvine, CA – July 13, 2015 – CrowdStrike Inc., provider of the first true Software-as-a Service (SaaS) based next-generation endpoint protection platform, today announced that the company has completed a $100 million Series C financing round, led by Google Capital. Rackspace (NASDAQ: RAX), a CrowdStrike customer, also participated in the round along with existing investors Accel and Warburg Pincus. This brings the company’s total funding raised to $156 million.

 

As the effectiveness of traditional antivirus and malware-centric security approaches continue to rapidly diminish, the CrowdStrike Falcon platform solves this fundamental problem by enabling organizations to detect, prevent and respond to attacks, at any stage – even malware-free intrusions.

 

“We were blown away by CrowdStrike’s incredible growth and impressive customer adoption,” said Gene Frantz, partner at Google Capital. “They have a truly unique SaaS-based endpoint security model, a highly scalable subscription revenue model, and a visionary technical approach that has huge potential to transform the industry, which is why we’re thrilled to make this investment.”

 

CrowdStrike has more than tripled its growth of total billings and employees year-over-year, and significantly increased its core customer base. The strong financial performance of the company is driven by massive worldwide deployments of CrowdStrike Falcon by global Fortune 500 companies.

 

CrowdStrike’s corporate growth and fast-yielding financial performance include:

 

550 percent Compounded Annual Growth Rate (CAGR) in Annual Recurring Revenue (ARR) for Falcon platform over the past three years

225 percent growth in Annual Contract Value (ACV) subscriptions, year-over-year

700 percent increase in the number of $1 million or greater transactions, year-over-year

CrowdStrike customers include three out of the top 10 largest global companies by revenue, two out of the top 10 credit card payment processors, five out of the top 10 largest banks, and three out of the top 10 oil and gas companies, as well as some of the world’s top technology companies.

 

“It’s extremely gratifying to bring in a high-caliber investor like Google Capital which shares our passion for innovation and sees the opportunity to completely transform the security industry,” said George Kurtz, CrowdStrike’s co-founder and chief executive officer. “As we continue to experience hyper-growth, this capital injection will help us firmly establish our SaaS-based endpoint protection platform as the leading solution to address today’s sophisticated attacks and will allow CrowdStrike to further accelerate our domestic and international expansion, ” said Kurtz.

 

“Rackspace was an early adopter of the CrowdStrike Falcon platform and we have seen first-hand the decisive advantage that CrowdStrike offers to proactively detect and prevent sophisticated attacks,” said Brian Kelly, chief security officer at Rackspace. “Unlike other endpoint security tools, CrowdStrike’s scalable cloud-based architecture provides unrivaled visibility and enables significantly faster response time to cyber threats. CrowdStrike also will be a key component of an upcoming line of security offerings being launched at Rackspace this year.”

 

To learn more about the funding, read a blog post from George Kurtz, co-founder and chief executive officer of CrowdStrike: https://blog.crowdstrike.com/google-capital-bets-big-on-crowdstrike

 

About CrowdStrike

CrowdStrike™ is a leading provider of next-generation endpoint protection, threat intelligence, and pre and post incident response services. CrowdStrike Falcon is the first true Software-as-a- Service (SaaS) based platform for next-generation endpoint protection that detects, prevents, and responds to attacks, at any stage – even malware-free intrusions. Falcon’s patented lightweight endpoint sensor can be deployed to over 100,000 endpoints in hours providing visibility into billions of events in real-time.

 

CrowdStrike operates on a highly scalable subscription-based business model that allows customers the flexibility to use CrowdStrike-as-a-Service to multiply their security team’s effectiveness and expertise with 24/7 endpoint visibility, monitoring, and response.

Anonymous ID: 24f005 July 16, 2018, 7:29 p.m. No.2181937   🗄️.is 🔗kun   >>1961

Alperovitch, a Russian expatriate working at the Atlantic Council policy research center in Washington, co-founded the company in 2011.

https://freewestmedia.com/2017/03/23/delusional-report-on-russian-hacking-in-ukraine/

 

Crowdstrike

 

The firm boasts two former FBI agents: Shawn Henry, who oversaw global cyber investigations at the agency, and Steven Chabinsky, who was the agency’s top cyber lawyer and had served on an Obama administration’s cybersecurity commission.

 

Hmmm Interesting

Anonymous ID: 24f005 July 16, 2018, 7:32 p.m. No.2181966   🗄️.is 🔗kun

https://www.bloomberg.com/view/articles/2018-01-26/release-the-dutch-evidence-of-the-dnc-hack

 

Release the Dutch Evidence of the DNC Hack

If the Dutch intelligence service watched the Russians breach the Democratic National Committee, there's no more reason to hide the evidence.

By Leonid Bershidsky

January 26, 2018, 6:09 AM EST

 

For the first time in a year, significant new information has emerged linking the 2016 U.S. Democratic National Committee security breach to Russia. A newspaper in the Netherlands reports that U.S. authorities received evidence of the hack from the Dutch intelligence service, which had penetrated the Russian hackers. The report partly explains the U.S. intelligence community's certainty about what happened to the DNC and its reluctance to tell the public more. But it also raises new questions.

 

The story in the daily De Volkskrant is based on anonymous sources, as are almost all other substantial reports about Russian interference in the U.S. presidential election. But it provides enough exciting detail to be a major addition to what's publicly available. According to the paper, hackers from AIVD, the Dutch General Intelligence and Security Service, penetrated the network of the Russian hacker group known as Cozy Bear in the summer of 2014.

 

According to the Dutch story, Cozy Bear, or, to use its generic designation in the cybersecurity community, Advanced Persistent Threat 29, worked from "a space in a university building near the Red Square." That would fit the description of Moscow State University's historic campus across from Red Square, occupied today by some of its humanities departments and the Institute of Asian and African Countries, which has traditionally sent large numbers of its graduates to the SVR, the Russian foreign intelligence service.

 

The Dutch hackers, reportedly, didn't just watch everything Cozy Bear – a fluid group in which about 10 people were active at any given time – was doing on its computers. They also took over the security camera that recorded all the comings and goings at the group's space. Dutch intelligence matched the faces of visitors against a database of known Russian agents and linked the group to the SVR. Crowdstrike, the cybersecurity firm retained by the DNC, hinted in its analysis of the breach that Cozy Bear could have been run by either SVR or the FSB, Russia's domestic intelligence service, so the Dutch report clarifies the attribution.

 

In November 2014, the Dutch reportedly alerted the U.S. intelligence community that Cozy Bear was attacking the State Department, and helped the National Security Agency thwart the sustained attack. The Volkskrant story also claims that, a year after it first penetrated APT Cozy Bear in the summer of 2015, the Dutch intelligence service witnessed how the Russian hackers launched "an attack on the Democratic Party in the United States."

 

More at link