The Biggest IT Outage Ever Explained - CrowdStrike Strikes Bad !!!

แชร์
ฝัง
  • เผยแพร่เมื่อ 17 พ.ย. 2024

ความคิดเห็น • 13

  • @DavidCandelaMartinez
    @DavidCandelaMartinez 4 หลายเดือนก่อน +1

    Thanks for the quick explanation! It affected massively the airport of my city just in the worse possible time now that all the tourists are arriving and locals flying out for vacation. Crazy to think that these companies don't have a test environment.

    • @lab_cyber
      @lab_cyber  4 หลายเดือนก่อน

      Oh wow that sucks. Regarding the testing environment, yes so many companies don't have them but perhaps this might serve as a wake up call for them

  • @KOSisNeeded
    @KOSisNeeded 4 หลายเดือนก่อน +2

    Good video, it's amazing that these big companies didn't do what you said. No QA environment, ouch!!!

    • @lab_cyber
      @lab_cyber  4 หลายเดือนก่อน

      Well many of these companies make the mistake of trusting the developers of the software they use.

  • @ramonj7113
    @ramonj7113 4 หลายเดือนก่อน

    Thanks for the timely update. I understand now what happened..

  • @Espi68One
    @Espi68One 4 หลายเดือนก่อน

    They need to watch your security video on Testing in sandbox or VM environment .

  • @nyviaross3588
    @nyviaross3588 4 หลายเดือนก่อน

    Thanks Alex!

  • @DanMillerXYZ
    @DanMillerXYZ 3 หลายเดือนก่อน

    ChatGPT is telling me it was a supply chain attack on Crowd Strike.
    "The supply chain attack on CrowdStrike involved the compromise of the XZ Utils data compression library, specifically versions 5.6.0 and 5.6.1, as identified by the CVE-2024-3094 vulnerability. This attack inserted malicious code into the library, which is commonly used in various Linux distributions. The malicious code aimed to create a backdoor, potentially allowing unauthorized access to systems using the compromised library.
    Supply chain attacks like this one highlight the vulnerabilities inherent in relying on third-party software components. The attack on CrowdStrike demonstrates how malicious actors can exploit these dependencies to infiltrate even well-protected environments. Continuous monitoring, timely updates, and robust security protocols are essential in mitigating the risks posed by such sophisticated cyber threats."

    • @thinkIndependent2024
      @thinkIndependent2024 3 หลายเดือนก่อน

      Nah !!! it was a software device driver that had access to the kernel

  • @kwaseng6939
    @kwaseng6939 4 หลายเดือนก่อน

    While BSOD, something that have been happening for a long long time.

    • @lab_cyber
      @lab_cyber  4 หลายเดือนก่อน

      Yes for almost 30 years now

  • @paolorivolta4087
    @paolorivolta4087 4 หลายเดือนก่อน

    Ok, but... what about pre-release test, especially on such important MS infrastructure?? If I were Microsoft, I asked in the Crowdstrike contract to do a pre-release check on an exact copy of my critical servers, before massive release.....😮
    Or I missed something?

    • @lab_cyber
      @lab_cyber  4 หลายเดือนก่อน +1

      No you didn't miss anything. I am sure CrowdStrike has a team for testing updates but I believe they messed up big time and didn't do their jobs properly.