CrowdStrike and KPMG join forces to accelerate SOC transformation with AI-powered Falcon platform
Attacks on smartphones increased in the first half of 2025, says Kaspersky
CISO news
CrowdStrike and KPMG join forces to accelerate SOC transformation with AI-powered Falcon platform
rowdStrike has announced that KPMG is expanding its
C cybersecurity services with the CrowdStrike Falcon platform.
KPMG plans to integrate Falcon Next-Gen SIEM into its professional service offerings and adopt CrowdStrike’ s Engagement Licensing Programme( ELP) to leverage the Falcon platform holistically and extensively in client engagements.
Adversaries are moving at machine speed, overwhelming organisations still reliant on costly, inefficient and slow legacy SIEMs.
By adopting Falcon Next-Gen SIEM to deliver new advisory, implementation and managed services, and expanding use of the Falcon platform through ELP, KPMG expects to strengthen its existing cybersecurity offerings to support clients as they modernise security operations, upskill their people and drive efficiencies and cost savings, while enhancing automation with an AI-powered SOC.
KPMG helps clients combine digital identity management for access control, cybersecurity risk management around vulnerability identification and threat management for real-time threat detection and response so that they can not only understand, prioritise and manage cybersecurity risk but then leverage that risk to drive innovation and growth.
“ Adversaries are weaponising AI to move faster than ever, and legacy security operations can’ t keep up,” said Daniel Bernard, Chief Business Officer, CrowdStrike.
“ Falcon Next-Gen SIEM is the engine powering the modern SOC. With KPMG collaborating on Falcon Next-Gen SIEM and expanding adoption of the Falcon platform, clients
Daniel Bernard, Chief Business Officer, CrowdStrike
can modernise security operations that are smarter, faster and built to stop breaches.”
Attacks on smartphones increased in the first half of 2025, says Kaspersky
ccording to Kaspersky data, there were 29 % more attacks on Android smartphone users in the first half of 2025
A compared to the first half of 2024 and 48 % more compared to the second half of 2024.
In 2025 Kaspersky detected prominent mobile threats such as SparkCat, SparkKitty and Triada, but there were other active threats as well, including apps with adult content that could launch DDoS attacks and a VPN app that intercepted login codes sent through text messages. Attackers also embedded functionality for dynamically configured DDoS attacks into applications for viewing adult content. The trojan enables sending specific data from the infected device to the attackers at specified time intervals
Additionally, Kaspersky also recently detected a fake VPN client that hijacks different user accounts: instead of providing the declared functionality, it intercepts one-time password codes from various messengers and social networks by monitoring notifications and sends them to the attackers via a Telegram bot.
“ The first half of 2025 saw a surge in Android malware attacks compared to 2024,” said Anton Kivva, Malware Analyst Team Lead at Kaspersky.“ There are different attack vectors and sideloading apps from outside app stores is one of them. Google’ s recent initiative to verify developers even for sideloaded apps is an attempt to counter malware spread via APK files outside official app stores.“
WWW. INTELLIGENTCISO. COM 9