{"description":"Trending threats, MITRE ATT\u0026CK coverage, and detection metadata — refreshed continuously.","feed_url":"https://feed.craftedsignal.io/tags/agentic-soc/","home_page_url":"https://feed.craftedsignal.io/","items":[{"_cs_actors":[],"_cs_cves":[],"_cs_exploited":false,"_cs_products":[],"_cs_severities":["high"],"_cs_tags":["AI","agentic-soc","shadow-ai"],"_cs_type":"advisory","_cs_vendors":[],"content_html":"\u003cp\u003eOrganizations are rapidly adopting AI tools, deploying AI agents, and building AI-powered software, which introduces new attack surfaces. These new surfaces are often unprotected by traditional security controls. This rapid adoption of AI has led to the rise of shadow AI, where employees adopt AI tools without oversight and engineering teams deploy models and agents without adequate visibility and runtime protection. CrowdStrike is releasing new innovations across their Falcon platform to extend AI detection and response (AIDR) capabilities to secure AI workforce adoption and development across endpoints, SaaS environments, and cloud environments. Specifically, CrowdStrike is providing AI Detection and Response for desktop AI applications like ChatGPT, Gemini, Claude, DeepSeek, Microsoft Copilot, O365 Copilot, GitHub Copilot, and Cursor. This will give security teams visibility into employees’ use of these AI apps, including full prompt content, and the ability to detect prompt attacks, data leaks, and access control and content policy violations.\u003c/p\u003e\n\u003ch2 id=\"attack-chain\"\u003eAttack Chain\u003c/h2\u003e\n\u003col\u003e\n\u003cli\u003eAn attacker gains initial access to an endpoint, potentially through social engineering or exploiting a software vulnerability (Initial Access).\u003c/li\u003e\n\u003cli\u003eThe attacker leverages a personal AI agent like OpenClaw, taking advantage of its high system permissions and minimal governance, to execute terminal commands (Execution).\u003c/li\u003e\n\u003cli\u003eThe AI agent is used to browse the web and interact with files on the system (Execution).\u003c/li\u003e\n\u003cli\u003eThe attacker leverages the AI agent\u0026rsquo;s capabilities to autonomously take actions that mimic legitimate user behavior, making detection difficult (Defense Evasion).\u003c/li\u003e\n\u003cli\u003eThe AI agent is used to access sensitive data stored on the endpoint, such as credentials, intellectual property, or customer data (Credential Access, Discovery).\u003c/li\u003e\n\u003cli\u003eThe AI agent is used to exfiltrate the stolen data to an external server controlled by the attacker (Exfiltration).\u003c/li\u003e\n\u003cli\u003eThe attacker uses prompt injection techniques to manipulate AI agents to perform malicious actions (Execution).\u003c/li\u003e\n\u003cli\u003eThe attacker gains access to sensitive data, intellectual property, or customer data, leading to financial loss, reputational damage, or regulatory fines (Impact).\u003c/li\u003e\n\u003c/ol\u003e\n\u003ch2 id=\"impact\"\u003eImpact\u003c/h2\u003e\n\u003cp\u003eSuccessful exploitation of AI agents can lead to significant data breaches, exposing sensitive information like customer data, intellectual property, and financial records. The rise of \u0026ldquo;living off the AI land\u0026rdquo; (LOTAIL) techniques makes it harder to detect malicious activity, allowing attackers to remain undetected for longer periods. This can cause financial losses due to data breaches and reputational damage. The sectors most impacted are those heavily adopting AI, including technology, finance, and healthcare, though all sectors are potentially vulnerable.\u003c/p\u003e\n\u003ch2 id=\"recommendation\"\u003eRecommendation\u003c/h2\u003e\n\u003cul\u003e\n\u003cli\u003eDeploy the Falcon AIDR browser extension from the Falcon console to monitor employee AI interactions and detect prompt attacks and data leaks across a range of AI tools on endpoints (AIDR Feature).\u003c/li\u003e\n\u003cli\u003eUtilize AI Discovery in CrowdStrike Falcon Exposure Management to identify AI-related components such as LLMs, Model Context Protocol (MCP) servers, and IDE extensions running across endpoints (Falcon Exposure Management).\u003c/li\u003e\n\u003cli\u003eMonitor Falcon AIDR alerts for suspicious activities related to Microsoft Copilot Studio agents, including prompt injection attacks, data leaks, and policy violations (Falcon AIDR).\u003c/li\u003e\n\u003c/ul\u003e\n","date_modified":"2026-03-30T06:41:52Z","date_published":"2026-03-30T06:41:52Z","id":"/briefs/2026-04-securing-ai-agents/","summary":"CrowdStrike is introducing new capabilities to secure AI agents and govern shadow AI across endpoints, SaaS, and cloud environments by providing detection and response (AIDR) for desktop AI applications, discovery of AI-related components, and runtime security for agents built in Microsoft Copilot Studio to combat attacks like living off the AI land (LOTAIL) by securing the agentic interaction layer.","title":"Securing AI Agents and Governing Shadow AI","url":"https://feed.craftedsignal.io/briefs/2026-04-securing-ai-agents/"},{"_cs_actors":[],"_cs_cves":[],"_cs_exploited":false,"_cs_products":[],"_cs_severities":["medium"],"_cs_tags":["ai","security","agentic-soc"],"_cs_type":"advisory","_cs_vendors":[],"content_html":"\u003cp\u003eThe increasing adoption of AI agents in mainstream business tools presents new security challenges. A compromised agent can lead to data exposure, unauthorized transactions, and compliance violations. To address these risks, CrowdStrike Falcon AIDR now supports NVIDIA NeMo Guardrails. This integration provides enterprise-grade protection by defining guardrails and applying constraints on LLMs. NVIDIA NeMo Guardrails, an open-source library, offers features like content safety, PII detection, jailbreak detection, and topic control. Falcon AIDR and NeMo Guardrails enable developers to manage data access, control agent responses, and ensure policy compliance, facilitating the secure transition of AI agents from development to production. This solution helps organizations maintain visibility and control over their AI agents.\u003c/p\u003e\n\u003ch2 id=\"attack-chain\"\u003eAttack Chain\u003c/h2\u003e\n\u003col\u003e\n\u003cli\u003e\u003cstrong\u003eInitial Access:\u003c/strong\u003e An attacker crafts a malicious prompt to interact with an AI agent.\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003ePrompt Injection:\u003c/strong\u003e The malicious prompt injects unintended commands or instructions into the agent\u0026rsquo;s processing flow.\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003eBypass Guardrails (Attempt):\u003c/strong\u003e The attacker attempts to bypass existing guardrails using sophisticated injection techniques.\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003eData Exfiltration:\u003c/strong\u003e If successful, the attacker exploits the agent to access and exfiltrate sensitive data (e.g., customer PII, internal documents).\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003eUnauthorized Actions:\u003c/strong\u003e The attacker manipulates the agent to perform unauthorized actions, such as initiating fraudulent transactions or modifying configurations.\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003eLateral Movement (Potential):\u003c/strong\u003e In some scenarios, a compromised agent could be leveraged to access other systems or data sources within the organization\u0026rsquo;s environment.\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003eCompliance Violation:\u003c/strong\u003e The agent\u0026rsquo;s actions result in violations of regulatory compliance requirements (e.g., HIPAA, GDPR).\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003eImpact:\u003c/strong\u003e Data breach, financial loss, reputational damage, and legal penalties.\u003c/li\u003e\n\u003c/ol\u003e\n\u003ch2 id=\"impact\"\u003eImpact\u003c/h2\u003e\n\u003cp\u003eA successful attack against an AI agent can have significant consequences. Data breaches exposing customer PII, unauthorized transactions leading to financial losses, and compliance violations resulting in legal penalties are all potential outcomes. The impact spans across various sectors, including financial services, healthcare, and customer service, where AI agents handle sensitive data and critical business processes. The extent of the damage depends on the agent\u0026rsquo;s access privileges and the sensitivity of the data it handles. Even a single compromised agent can expose thousands of interactions, amplifying the blast radius of an attack.\u003c/p\u003e\n\u003ch2 id=\"recommendation\"\u003eRecommendation\u003c/h2\u003e\n\u003cul\u003e\n\u003cli\u003eDeploy Falcon AIDR with NVIDIA NeMo Guardrails to enforce content safety, PII protection, and jailbreak detection (see Overview).\u003c/li\u003e\n\u003cli\u003eImplement custom data classification rules in Falcon AIDR to align with your organization\u0026rsquo;s specific data protection requirements (see Overview).\u003c/li\u003e\n\u003cli\u003eEnable monitoring mode in Falcon AIDR to understand the threat landscape and progressively enforce blocks and redactions as agents move from development to production (see Use Cases).\u003c/li\u003e\n\u003cli\u003eCreate named detection policies in Falcon AIDR tailored to specific security requirements at critical points in AI agent workflows (see Configuring Falcon AIDR Policies).\u003c/li\u003e\n\u003cli\u003eMonitor web server logs for unexpected HTTP requests that might indicate prompt injection attempts targeting AI agents (see rules).\u003c/li\u003e\n\u003c/ul\u003e\n","date_modified":"2026-03-28T21:37:25Z","date_published":"2026-03-28T21:37:25Z","id":"/briefs/2026-03-ai-agent-security/","summary":"CrowdStrike Falcon AIDR integrates with NVIDIA NeMo Guardrails to provide comprehensive protection for AI agents against prompt injection, data leaks, and malicious content.","title":"Securing AI Agents with CrowdStrike Falcon AIDR and NVIDIA NeMo Guardrails","url":"https://feed.craftedsignal.io/briefs/2026-03-ai-agent-security/"},{"_cs_actors":[],"_cs_cves":[],"_cs_exploited":false,"_cs_products":[],"_cs_severities":["medium"],"_cs_tags":["ai","security","falcon","agentic-soc","prompt-injection"],"_cs_type":"advisory","_cs_vendors":[],"content_html":"\u003cp\u003eCrowdStrike is addressing the emerging threats associated with the rapid adoption of AI tools and AI-powered software by enhancing its Falcon platform. These enhancements focus on providing AI Detection and Response (AIDR) capabilities across endpoints, SaaS environments, and cloud environments. The core issue being addressed is the increasing attack surface created by novel threats, such as indirect prompt injection and agentic tool chain attacks, alongside the widespread adoption of shadow AI. This adoption leads to visibility and governance gaps, creating opportunities for adversaries to exploit the \u0026ldquo;living off the AI land\u0026rdquo; (LOTAIL) technique, particularly on developer machines where AI agents with high system permissions are deployed with minimal governance. The new Falcon capabilities aim to provide security teams with the visibility and threat detection necessary to secure AI workforce adoption and development.\u003c/p\u003e\n\u003ch2 id=\"attack-chain\"\u003eAttack Chain\u003c/h2\u003e\n\u003col\u003e\n\u003cli\u003e\u003cstrong\u003eInitial Access:\u003c/strong\u003e An attacker gains initial access to a system, potentially through compromised credentials or a vulnerability in a third-party application or service.\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003eAgent Deployment:\u003c/strong\u003e The attacker deploys a malicious AI agent, such as a compromised Model Context Protocol (MCP) server or a malicious IDE extension, onto a developer\u0026rsquo;s machine.\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003ePrivilege Escalation:\u003c/strong\u003e The malicious AI agent leverages its high system permissions to escalate privileges.\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003ePrompt Injection:\u003c/strong\u003e The attacker uses prompt injection techniques to manipulate the behavior of legitimate AI agents like ChatGPT, Gemini, or Microsoft Copilot.\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003eData Exfiltration:\u003c/strong\u003e The compromised or manipulated AI agents are used to exfiltrate sensitive data from the organization.\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003eLateral Movement:\u003c/strong\u003e The attacker uses the compromised endpoint as a launchpad to move laterally within the network, targeting other critical systems and data stores.\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003ePolicy Violation:\u003c/strong\u003e The attacker manipulates AI agents to violate security policies.\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003eImpact:\u003c/strong\u003e The attacker achieves their objective, such as stealing sensitive data, disrupting business operations, or causing reputational damage.\u003c/li\u003e\n\u003c/ol\u003e\n\u003ch2 id=\"impact\"\u003eImpact\u003c/h2\u003e\n\u003cp\u003eThe exploitation of AI environments can lead to significant data breaches, intellectual property theft, and disruption of critical business operations. The lack of visibility and governance over AI tools and agents allows attackers to operate undetected, increasing the potential for widespread damage. Organizations across all sectors are vulnerable, especially those heavily reliant on AI for development and operations. Successful attacks can result in financial losses, reputational damage, and regulatory penalties.\u003c/p\u003e\n\u003ch2 id=\"recommendation\"\u003eRecommendation\u003c/h2\u003e\n\u003cul\u003e\n\u003cli\u003eDeploy the provided Sigma rules to your SIEM to detect suspicious AI-related activity on endpoints.\u003c/li\u003e\n\u003cli\u003eUtilize CrowdStrike Falcon Exposure Management to discover and classify AI-related components running across endpoints in real-time.\u003c/li\u003e\n\u003cli\u003eImplement Falcon AIDR policies to monitor and protect agents built in Microsoft Copilot Studio against prompt injection attacks and data leaks.\u003c/li\u003e\n\u003cli\u003eLeverage Falcon AIDR\u0026rsquo;s runtime threat detection capabilities to secure workforce AI adoption across both browser-based and desktop AI applications (ChatGPT, Gemini, Claude, etc.).\u003c/li\u003e\n\u003cli\u003eReview and update existing security policies to address the specific risks associated with AI agents and shadow AI, focusing on access control, data protection, and prompt injection prevention.\u003c/li\u003e\n\u003c/ul\u003e\n","date_modified":"2026-03-28T09:35:50Z","date_published":"2026-03-28T09:35:50Z","id":"/briefs/2026-03-crowdstrike-ai-security/","summary":"CrowdStrike is enhancing its Falcon platform with new features focusing on AI Detection and Response (AIDR) capabilities across endpoints, SaaS, and cloud environments to mitigate risks such as prompt injection attacks, data leaks, and policy violations related to AI agents and shadow AI.","title":"CrowdStrike Falcon Enhancements for Securing AI Environments","url":"https://feed.craftedsignal.io/briefs/2026-03-crowdstrike-ai-security/"},{"_cs_actors":[],"_cs_cves":[],"_cs_exploited":false,"_cs_products":[],"_cs_severities":["medium"],"_cs_tags":["agentic-soc","mdr","soc","ai"],"_cs_type":"advisory","_cs_vendors":[],"content_html":"\u003cp\u003eCrowdStrike has announced agentic MDR and SOC Transformation Services to improve the effectiveness of security operations centers (SOCs). The agentic MDR solution is designed to leverage machine-speed execution with expert accountability to stop breaches more efficiently. This involves combining deterministic automation with expert-defined guardrails, adaptive AI agents, and human oversight to ensure rapid and precise responses to threats. SOC Transformation Services aim to modernize the foundational aspects of SOC operations, including SIEM systems, data pipelines, workflows, talent models, and governance frameworks. These services are designed to help organizations establish the necessary operating conditions for agentic SOC operations, enabling them to evolve their security practices safely and deliberately. This addresses the challenge organizations face in scaling agentic security due to a lack of clean data foundations, modern workflows, and governance structures.\u003c/p\u003e\n\u003ch2 id=\"attack-chain\"\u003eAttack Chain\u003c/h2\u003e\n\u003cp\u003eGiven the nature of this announcement focusing on services rather than specific attacks, the following represents a generalized attack chain that CrowdStrike\u0026rsquo;s Agentic MDR and SOC Transformation Services aim to disrupt and mitigate.\u003c/p\u003e\n\u003col\u003e\n\u003cli\u003e\u003cstrong\u003eInitial Access:\u003c/strong\u003e An attacker gains initial access to a system or network through various means, such as phishing, exploiting vulnerabilities, or using stolen credentials.\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003eExecution:\u003c/strong\u003e The attacker executes malicious code on the compromised system, often using scripting languages like PowerShell or Python.\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003ePersistence:\u003c/strong\u003e The attacker establishes persistence mechanisms to maintain access to the system, such as creating scheduled tasks or modifying registry keys.\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003ePrivilege Escalation:\u003c/strong\u003e The attacker attempts to escalate privileges to gain higher-level access to the system and network.\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003eLateral Movement:\u003c/strong\u003e The attacker moves laterally within the network, compromising additional systems and expanding their control.\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003eData Exfiltration:\u003c/strong\u003e The attacker identifies and exfiltrates sensitive data from the compromised systems to an external location.\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003eImpact:\u003c/strong\u003e The attacker achieves their final objective, which could include data theft, ransomware deployment, or disruption of services.\u003c/li\u003e\n\u003c/ol\u003e\n\u003ch2 id=\"impact\"\u003eImpact\u003c/h2\u003e\n\u003cp\u003eThe potential impact of successful attacks on organizations without adequate security measures can be significant. This includes data breaches, financial losses, reputational damage, and disruption of critical services. Organizations lacking modern security operations capabilities may struggle to detect and respond to advanced threats, leading to prolonged incidents and increased damage. CrowdStrike\u0026rsquo;s agentic MDR and SOC Transformation Services aim to mitigate these risks by providing faster detection, automated response, and expert guidance to improve overall security posture.\u003c/p\u003e\n\u003ch2 id=\"recommendation\"\u003eRecommendation\u003c/h2\u003e\n\u003cul\u003e\n\u003cli\u003eEvaluate your current SIEM and logging architecture and create a migration plan to a modern SIEM solution like CrowdStrike Falcon Next-Gen SIEM, focusing on log source onboarding, parsing, normalization, and retention strategy.\u003c/li\u003e\n\u003cli\u003eRedesign your triage, escalation, containment, and recovery workflows to align with your team structure, staffing model, and business risk tolerance, as described in the \u0026ldquo;SOC Transformation Services\u0026rdquo; section.\u003c/li\u003e\n\u003cli\u003ePrioritize the development and deployment of detection rules and automation, incorporating AI use case development and guardrails for safe response actions, leveraging the capabilities outlined in the \u0026ldquo;SOC Transformation Services\u0026rdquo; section.\u003c/li\u003e\n\u003c/ul\u003e\n","date_modified":"2026-03-28T09:23:42Z","date_published":"2026-03-28T09:23:42Z","id":"/briefs/2026-03-agentic-mdr-soc/","summary":"CrowdStrike introduces agentic MDR and SOC Transformation Services to enhance breach prevention through machine-speed execution and expert oversight, while SOC Transformation Services aim to modernize security operations by focusing on SIEM, data pipelines, workflows, talent models, and governance.","title":"CrowdStrike Agentic MDR and SOC Transformation Services","url":"https://feed.craftedsignal.io/briefs/2026-03-agentic-mdr-soc/"},{"_cs_actors":[],"_cs_cves":[],"_cs_exploited":false,"_cs_products":[],"_cs_severities":["medium"],"_cs_tags":["agentic-soc","ai-security","automation"],"_cs_type":"advisory","_cs_vendors":[],"content_html":"\u003cp\u003eCrowdStrike has introduced Charlotte AI AgentWorks, a platform designed to enable the development and orchestration of AI-powered security agents within the Security Operations Center (SOC). Launched in March 2026, the platform aims to shift analysts from manual firefighting to strategic oversight by automating tasks and enabling context-aware responses. Charlotte AI AgentWorks integrates with leading AI models from Anthropic, NVIDIA, and OpenAI, and provides twelve pre-built agents for tasks like triage and malware analysis. The platform intends to foster collaboration and innovation in agentic security, offering free AI credits to encourage adoption and experimentation among CrowdStrike customers. This initiative is driven by the increasing speed and sophistication of cyberattacks, requiring security operations to leverage AI for faster and more effective threat response.\u003c/p\u003e\n\u003ch2 id=\"attack-chain\"\u003eAttack Chain\u003c/h2\u003e\n\u003cp\u003eThis brief focuses on the capabilities of Charlotte AI AgentWorks as a defensive tool. Therefore, the attack chain describes hypothetical scenarios where such a tool could be deployed to counter an attack.\u003c/p\u003e\n\u003col\u003e\n\u003cli\u003e\u003cstrong\u003eInitial Access:\u003c/strong\u003e An attacker gains initial access via a phishing email containing a malicious attachment (e.g., a weaponized document).\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003eExecution:\u003c/strong\u003e The user opens the malicious attachment, which executes a PowerShell script designed to download a second-stage payload.\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003ePersistence:\u003c/strong\u003e The PowerShell script creates a scheduled task to ensure the payload executes regularly, even after a system reboot.\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003eDefense Evasion:\u003c/strong\u003e The attacker attempts to disable or bypass security controls (e.g., disabling Windows Defender) to avoid detection.\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003eCommand and Control:\u003c/strong\u003e The downloaded payload establishes a connection to a command-and-control (C2) server, allowing the attacker to issue commands and exfiltrate data.\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003eLateral Movement:\u003c/strong\u003e The attacker uses compromised credentials or exploits vulnerabilities to move laterally within the network, targeting critical systems and data.\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003eData Exfiltration:\u003c/strong\u003e The attacker exfiltrates sensitive data from the compromised systems to an external server under their control.\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003eImpact:\u003c/strong\u003e The attacker encrypts critical data, demanding a ransom for its decryption.\u003c/li\u003e\n\u003c/ol\u003e\n\u003ch2 id=\"impact\"\u003eImpact\u003c/h2\u003e\n\u003cp\u003eIf an attack succeeds, organizations may experience significant data breaches, financial losses, and reputational damage. The rise of AI-powered adversaries is accelerating the speed of attacks, with breakout times collapsing to as fast as 27 seconds. Successful attacks may lead to ransomware deployment, intellectual property theft, and disruption of critical services. Organizations are looking to AI-driven security solutions, such as Charlotte AI AgentWorks, to enhance their defenses and mitigate these risks.\u003c/p\u003e\n\u003ch2 id=\"recommendation\"\u003eRecommendation\u003c/h2\u003e\n\u003cul\u003e\n\u003cli\u003eDeploy and configure CrowdStrike Falcon to collect relevant telemetry data for the rules below, enabling detection of suspicious activities indicative of attack chains.\u003c/li\u003e\n\u003cli\u003eDeploy the provided Sigma rules to detect potentially malicious PowerShell execution and scheduled task creation.\u003c/li\u003e\n\u003cli\u003eUtilize Charlotte AI AgentWorks\u0026rsquo;s pre-built agents for malware analysis and triage to accelerate incident response.\u003c/li\u003e\n\u003cli\u003eExperiment with Charlotte AI using the free AI credits to convert natural language into governed automation, improving security workflows.\u003c/li\u003e\n\u003c/ul\u003e\n","date_modified":"2026-03-28T09:13:21Z","date_published":"2026-03-28T09:13:21Z","id":"/briefs/2026-03-charlotte-ai/","summary":"CrowdStrike's Charlotte AI AgentWorks facilitates the development and deployment of AI-driven security agents within the SOC, aiming to enhance analyst capabilities through automated and orchestrated responses to threats.","title":"CrowdStrike Charlotte AI AgentWorks for Agentic SOC Transformation","url":"https://feed.craftedsignal.io/briefs/2026-03-charlotte-ai/"},{"_cs_actors":[],"_cs_cves":[],"_cs_exploited":false,"_cs_products":[],"_cs_severities":["medium"],"_cs_tags":["agentic-soc","ai","security-automation"],"_cs_type":"advisory","_cs_vendors":[],"content_html":"\u003cp\u003eCrowdStrike has introduced Charlotte AI AgentWorks and Charlotte Agentic SOAR as a foundation for agentic security operations. Charlotte AI AgentWorks is designed to be a central hub for building and scaling security agents, integrating frontier AI models from Anthropic, NVIDIA, and OpenAI. This platform enables partners and service providers like Accenture, Deloitte, Kroll, Telefonica Tech, and Salesforce to develop custom agents tailored for diverse teams and environments. Charlotte Agentic SOAR serves as the orchestration layer, activating and coordinating agents across complex workflows while maintaining human oversight and security guardrails. The goal is to amplify analyst capabilities, automate time-intensive tasks, and improve decision accuracy in the face of AI-powered adversaries.\u003c/p\u003e\n\u003ch2 id=\"attack-chain\"\u003eAttack Chain\u003c/h2\u003e\n\u003col\u003e\n\u003cli\u003e\u003cstrong\u003eInitial Compromise (Simulated):\u003c/strong\u003e An attacker attempts to leverage a vulnerability, triggering a security alert that requires immediate attention.\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003eAgent Activation:\u003c/strong\u003e Charlotte Agentic SOAR automatically activates a malware analysis agent to examine suspicious files.\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003eData Analysis:\u003c/strong\u003e The malware analysis agent analyzes the file using integrated threat intelligence and AI models.\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003eThreat Prioritization:\u003c/strong\u003e An exposure prioritization agent is engaged to identify and rank potential risks associated with the alert.\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003eWorkflow Automation:\u003c/strong\u003e Based on the agent\u0026rsquo;s findings, automated workflows are initiated to contain the potential threat and alert relevant personnel.\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003eHuman Oversight:\u003c/strong\u003e Analysts review the agent\u0026rsquo;s findings and the automated actions, providing oversight and making strategic decisions.\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003eRemediation:\u003c/strong\u003e The security team uses the enriched data to quickly respond and remediate the threat.\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003eAdaptive Security:\u003c/strong\u003e The entire process enhances the overall security posture by automating mundane tasks, allowing the analysts to focus on critical and complex issues, improving overall incident response time and accuracy.\u003c/li\u003e\n\u003c/ol\u003e\n\u003ch2 id=\"impact\"\u003eImpact\u003c/h2\u003e\n\u003cp\u003eBy leveraging Charlotte AI AgentWorks and Agentic SOAR, organizations can potentially reduce manual investigation workloads by up to 70%, restore approximately 40 hours of team capacity per week, and achieve decision accuracy exceeding 98%. This enhanced efficiency and precision can significantly improve an organization\u0026rsquo;s ability to detect and respond to threats, minimizing the impact of successful attacks.\u003c/p\u003e\n\u003ch2 id=\"recommendation\"\u003eRecommendation\u003c/h2\u003e\n\u003cul\u003e\n\u003cli\u003eInvestigate the capabilities of Charlotte AI AgentWorks and Agentic SOAR to determine potential benefits for your security operations, referencing the CrowdStrike documentation available online (\u003ca href=\"https://www.crowdstrike.com/en-us/blog/how-charlotte-ai-agentworks-fuels-securitys-agentic-ecosystem/\"\u003ehttps://www.crowdstrike.com/en-us/blog/how-charlotte-ai-agentworks-fuels-securitys-agentic-ecosystem/\u003c/a\u003e).\u003c/li\u003e\n\u003cli\u003eSimulate the attack chain described to understand how different AI agents can aid in analysis and remediation.\u003c/li\u003e\n\u003cli\u003eDeploy a detection rule to identify anomalies in workflow automation engines.\u003c/li\u003e\n\u003c/ul\u003e\n","date_modified":"2026-03-28T08:31:25Z","date_published":"2026-03-28T08:31:25Z","id":"/briefs/2024-07-charlotte-ai-agentworks/","summary":"CrowdStrike's Charlotte AI AgentWorks and Agentic SOAR aim to revolutionize security operations by enabling the creation and orchestration of AI-powered agents, enhancing analyst capabilities and automating tasks to combat AI-accelerated adversaries.","title":"CrowdStrike Charlotte AI AgentWorks and Agentic SOAR for Agentic Security Operations","url":"https://feed.craftedsignal.io/briefs/2024-07-charlotte-ai-agentworks/"},{"_cs_actors":[],"_cs_cves":[],"_cs_exploited":false,"_cs_products":[],"_cs_severities":["medium"],"_cs_tags":["agentic-soc","mdr","soc-transformation","ai"],"_cs_type":"advisory","_cs_vendors":[],"content_html":"\u003cp\u003eCrowdStrike has launched Agentic MDR and SOC Transformation Services, designed to modernize security operations centers (SOCs) and enhance breach prevention. These offerings aim to address the challenges of modern adversaries who leverage AI for evasion and operate at machine speed across diverse environments. Agentic MDR combines deterministic automation, adaptive AI agents, and expert human oversight, delivered through CrowdStrike Falcon® Complete. SOC Transformation Services focus on modernizing core SOC elements like SIEM, data pipelines, workflows, and talent models. The goal is to help organizations scale agentic security effectively by establishing clean data foundations, modern workflows, and governance guardrails. This initiative reflects the need for organizations to evolve their security operations to match the speed and sophistication of modern threats, ensuring they can leverage automation safely and consistently.\u003c/p\u003e\n\u003ch2 id=\"attack-chain\"\u003eAttack Chain\u003c/h2\u003e\n\u003col\u003e\n\u003cli\u003eInitial Access: Adversaries compromise systems using various methods, including exploiting vulnerabilities or through social engineering. (Generic)\u003c/li\u003e\n\u003cli\u003eExecution: Malicious code is executed on the compromised system, often leveraging scripting languages or existing system tools. (Generic)\u003c/li\u003e\n\u003cli\u003ePersistence: Attackers establish persistence mechanisms to maintain access to the system, such as creating scheduled tasks or modifying registry keys. (Generic)\u003c/li\u003e\n\u003cli\u003eDefense Evasion: Adversaries attempt to evade detection by disabling security tools, obfuscating code, or using living-off-the-land binaries (LOLBins). (Generic)\u003c/li\u003e\n\u003cli\u003eCommand and Control: A command and control (C2) channel is established to communicate with the attacker\u0026rsquo;s infrastructure. (Generic)\u003c/li\u003e\n\u003cli\u003eLateral Movement: Attackers move laterally within the network to access additional systems and resources. (Generic)\u003c/li\u003e\n\u003cli\u003eData Exfiltration: Sensitive data is exfiltrated from the compromised systems to the attacker\u0026rsquo;s control. (Generic)\u003c/li\u003e\n\u003cli\u003eImpact: The attack culminates in data breach, ransomware deployment, or other disruptive actions. (Generic)\u003c/li\u003e\n\u003c/ol\u003e\n\u003ch2 id=\"impact\"\u003eImpact\u003c/h2\u003e\n\u003cp\u003eThe successful execution of these attacks can lead to significant damage, including data breaches, financial losses, and reputational damage. The speed at which adversaries operate, measured in seconds, means that traditional security measures are often inadequate. The operational divide between organizations that can adopt agentic security and those that cannot widens, leaving the latter vulnerable to advanced threats. The integration of AI in attacks further complicates detection and response efforts.\u003c/p\u003e\n\u003ch2 id=\"recommendation\"\u003eRecommendation\u003c/h2\u003e\n\u003cul\u003e\n\u003cli\u003eDeploy CrowdStrike Falcon Fusion SOAR to automate response playbooks for known threats, leveraging the 1-minute median time to contain (MTTC) for faster remediation.\u003c/li\u003e\n\u003cli\u003eUtilize CrowdStrike SOC Transformation Services to modernize your SIEM and logging architecture, ensuring compatibility with Falcon Next-Gen SIEM.\u003c/li\u003e\n\u003cli\u003eImplement detection engineering and automation acceleration, including prioritized detection rules and AI use case development as part of SOC Transformation Services.\u003c/li\u003e\n\u003c/ul\u003e\n","date_modified":"2026-03-28T08:28:28Z","date_published":"2026-03-28T08:28:28Z","id":"/briefs/2026-03-agentic-mdr/","summary":"CrowdStrike's Agentic MDR combines machine-speed execution with expert oversight, leveraging deterministic automation and adaptive AI agents to enhance breach prevention and SOC modernization.","title":"CrowdStrike Agentic MDR and SOC Transformation Services","url":"https://feed.craftedsignal.io/briefs/2026-03-agentic-mdr/"},{"_cs_actors":[],"_cs_cves":[],"_cs_exploited":false,"_cs_products":[],"_cs_severities":["medium"],"_cs_tags":["agentic-soc","mdr","soc-transformation"],"_cs_type":"advisory","_cs_vendors":[],"content_html":"\u003cp\u003eCrowdStrike has announced agentic MDR and SOC Transformation Services to help organizations operationalize an agentic SOC. The modern threat landscape requires defenses that operate at machine speed, addressing threats across endpoints, identity, cloud, and third-party systems. Legacy SIEMs and manual workflows struggle to keep pace with this complexity. CrowdStrike\u0026rsquo;s agentic MDR, delivered through Falcon Complete, combines deterministic automation, adaptive AI agents, and elite human accountability to stop breaches rapidly. SOC Transformation Services focus on modernizing core elements of the SOC, including SIEM, data pipelines, workflows, and governance, to enable organizations to scale agentic security safely and consistently. This addresses the operational divide where some organizations are equipped for agentic execution while others struggle with governance and scaling.\u003c/p\u003e\n\u003ch2 id=\"attack-chain\"\u003eAttack Chain\u003c/h2\u003e\n\u003cp\u003eThis brief describes services intended to \u003cem\u003eprevent\u003c/em\u003e attacks, not an active attack chain. However, here\u0026rsquo;s a hypothetical scenario of how an adversary might operate in an environment \u003cem\u003elacking\u003c/em\u003e these agentic capabilities, highlighting the need for the services described:\u003c/p\u003e\n\u003col\u003e\n\u003cli\u003e\u003cstrong\u003eInitial Access:\u003c/strong\u003e An attacker gains initial access via a phishing email, delivering a malicious payload.\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003eExecution:\u003c/strong\u003e The payload executes on the endpoint, establishing a foothold for further exploitation.\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003ePersistence:\u003c/strong\u003e The attacker establishes persistence using techniques like scheduled tasks or registry modifications to ensure continued access.\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003ePrivilege Escalation:\u003c/strong\u003e The attacker attempts to escalate privileges to gain administrative control over the system.\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003eLateral Movement:\u003c/strong\u003e Using compromised credentials or exploits, the attacker moves laterally to other systems on the network.\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003eData Exfiltration:\u003c/strong\u003e The attacker identifies and exfiltrates sensitive data from compromised systems to an external location.\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003eImpact:\u003c/strong\u003e The attacker deploys ransomware across the network, encrypting critical files and demanding a ransom payment.\u003c/li\u003e\n\u003c/ol\u003e\n\u003ch2 id=\"impact\"\u003eImpact\u003c/h2\u003e\n\u003cp\u003eWithout agentic MDR and SOC capabilities, organizations face slower response times, increased operational noise, and inconsistent threat handling. The potential impact includes data breaches, ransomware attacks, financial losses, and reputational damage. The disparity between human-paced operations and automated attacks widens, leaving organizations vulnerable to sophisticated adversaries. Organizations that struggle to scale agentic security may experience prolonged incident response times, allowing attackers to cause significant damage before being detected and contained.\u003c/p\u003e\n\u003ch2 id=\"recommendation\"\u003eRecommendation\u003c/h2\u003e\n\u003cul\u003e\n\u003cli\u003eAssess your current SIEM and logging architecture to identify areas for modernization using CrowdStrike Falcon® Next-Gen SIEM mentioned in the overview.\u003c/li\u003e\n\u003cli\u003eRedesign triage, escalation, containment, and recovery workflows to align with team structure, staffing model, and business risk tolerance, improving efficiency and response times.\u003c/li\u003e\n\u003cli\u003ePrioritize detection engineering and automation acceleration using AI use case development to proactively identify and respond to threats.\u003c/li\u003e\n\u003cli\u003eImplement guardrails for safe response actions by leveraging elite human judgement to validate automation responses, preventing unintended consequences.\u003c/li\u003e\n\u003cli\u003eConsider using CrowdStrike SOC Transformation Services mentioned in the overview to modernize your SOC and establish foundational operating conditions for agentic SOC operations.\u003c/li\u003e\n\u003cli\u003eEvaluate CrowdStrike Falcon® Complete with agentic MDR to enhance speed, precision, and protection, benefiting from intelligent AI and automation operating seamlessly behind the scenes.\u003c/li\u003e\n\u003c/ul\u003e\n","date_modified":"2026-03-28T08:12:22Z","date_published":"2026-03-28T08:12:22Z","id":"/briefs/2026-03-agentic-soc/","summary":"CrowdStrike's agentic MDR combines automation, AI agents, and human oversight for rapid breach response, while SOC Transformation Services modernize security operations for an agentic SOC approach.","title":"CrowdStrike Agentic MDR and SOC Transformation Services","url":"https://feed.craftedsignal.io/briefs/2026-03-agentic-soc/"}],"language":"en","title":"CraftedSignal Threat Feed — Agentic-Soc","version":"https://jsonfeed.org/version/1.1"}