<?xml version="1.0" encoding="UTF-8"?><rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/"><channel><title>Blog</title><atom:link href="https://www.crowdstrike.com/en-us/blog/feed" rel="self" type="application/rss+xml"/><link>https://www.crowdstrike.com/en-us/blog/</link><description></description><lastBuildDate>Apr 20, 2026 15:25:59+0000</lastBuildDate><language>en-us</language><sy:updatePeriod>daily</sy:updatePeriod><sy:updateFrequency>1</sy:updateFrequency><image><title>Blog</title><link>https://www.crowdstrike.com/en-us/blog/</link></image><item><title>Frontier AI Is Collapsing the Exploit Window. Here&amp;rsquo;s How Defenders Must Respond.</title><link>https://www.crowdstrike.com/en-us/blog/frontier-ai-collapses-exploit-window-how-defenders-must-respond/</link><dc:creator><![CDATA[CrowdStrike]]></dc:creator><pubDate>Apr 20, 2026 00:00:00-0700</pubDate><category><![CDATA[Executive Viewpoint]]></category><type><![CDATA[Featured]]></type><guid isPermaLink="false">https://www.crowdstrike.com/?p=541625</guid></item><item><title>Frontier AI for Defenders: CrowdStrike and OpenAI TAC</title><link>https://www.crowdstrike.com/en-us/blog/frontier-ai-for-defenders-crowdstrike-and-openai-tac/</link><dc:creator><![CDATA[CrowdStrike]]></dc:creator><pubDate>Apr 16, 2026 00:00:00-0500</pubDate><category><![CDATA[Executive Viewpoint]]></category><type><![CDATA[Featured]]></type><guid isPermaLink="false">https://www.crowdstrike.com/?p=500848</guid></item><item><title>April 2026 Patch Tuesday: Two Zero-Days and Eight Critical Vulnerabilities Among 164 CVEs</title><link>https://www.crowdstrike.com/en-us/blog/patch-tuesday-analysis-april-2026/</link><dc:creator><![CDATA[Falcon Exposure Management Team]]></dc:creator><pubDate>Apr 14, 2026 00:00:00-0500</pubDate><category><![CDATA[Exposure Management]]></category><guid isPermaLink="false">https://www.crowdstrike.com/?p=909444</guid></item><item><title>Anthropic Claude Mythos Preview: The More Capable AI Becomes, the More Security It Needs</title><link>https://www.crowdstrike.com/en-us/blog/crowdstrike-founding-member-anthropic-mythos-frontier-model-to-secure-ai/</link><dc:creator><![CDATA[CrowdStrike]]></dc:creator><pubDate>Apr 06, 2026 00:00:00-0400</pubDate><category><![CDATA[Executive Viewpoint]]></category><type><![CDATA[Featured]]></type><guid isPermaLink="false">https://www.crowdstrike.com/?p=309176</guid></item><item><title>How CrowdStrike Is Accelerating Exposure Evaluation as Adversaries Gain Speed</title><link>https://www.crowdstrike.com/en-us/blog/how-crowdstrike-accelerates-exposure-evaluation-against-threats/</link><dc:creator><![CDATA[Rona Kedmi]]></dc:creator><pubDate>Apr 05, 2026 00:00:00-0700</pubDate><category><![CDATA[Exposure Management]]></category><guid isPermaLink="false">https://www.crowdstrike.com/?p=257430</guid></item><item><title>STARDUST CHOLLIMA Likely Compromises Axios npm Package</title><link>https://www.crowdstrike.com/en-us/blog/stardust-chollima-likely-compromises-axios-npm-package/</link><dc:creator><![CDATA[Counter Adversary Operations]]></dc:creator><pubDate>Apr 01, 2026 00:00:00-0500</pubDate><category><![CDATA[Threat Hunting & Intel]]></category><guid isPermaLink="false">https://www.crowdstrike.com/?p=250745</guid></item><item><title>Falcon for IT Supports Windows Secure Boot Certificate Lifecycle Management</title><link>https://www.crowdstrike.com/en-us/blog/falcon-for-it-supports-windows-secure-boot-certificate-lifecycle-management/</link><dc:creator><![CDATA[Dr. Beth Williams]]></dc:creator><pubDate>Apr 01, 2026 00:00:00-0500</pubDate><category><![CDATA[Endpoint Security & XDR]]></category><guid isPermaLink="false">https://www.crowdstrike.com/?p=145304</guid></item><item><title>Detecting CVE-2026-20929: Kerberos Authentication Relay via CNAME Abuse</title><link>https://www.crowdstrike.com/en-us/blog/detecting-kerberos-relay-attack-via-dns-cname-abuse/</link><dc:creator><![CDATA[Yan Linkov]]></dc:creator><pubDate>Mar 31, 2026 00:00:00-0500</pubDate><category><![CDATA[Next-Gen Identity Security]]></category><guid isPermaLink="false">https://www.crowdstrike.com/?p=954572</guid></item><item><title>How Charlotte AI AgentWorks Fuels Security's Agentic Ecosystem </title><link>https://www.crowdstrike.com/en-us/blog/how-charlotte-ai-agentworks-fuels-securitys-agentic-ecosystem/</link><dc:creator><![CDATA[Lucia Stanham]]></dc:creator><pubDate>Mar 25, 2026 00:00:00-0500</pubDate><category><![CDATA[Agentic SOC]]></category><guid isPermaLink="false">https://www.crowdstrike.com/?p=212588</guid></item><item><title>CrowdStrike Flex for Services Expands Access to Elite Security Expertise</title><link>https://www.crowdstrike.com/en-us/blog/crowdstrike-extends-the-falcon-flex-model-to-services/</link><dc:creator><![CDATA[JJ Cranford]]></dc:creator><pubDate>Mar 24, 2026 00:00:00-0500</pubDate><category><![CDATA[From The Front Lines]]></category><guid isPermaLink="false">https://www.crowdstrike.com/?p=410958</guid></item></channel></rss>