The CrowdStrike Outage: Explained

preview_player
Показать описание
===============================================
===============================================
Рекомендации по теме
Комментарии
Автор

when your one job is to prevent stuff like this from happening, then you pull a better denial of service by accident than any cybercriminal could dream of.

AshnSilvercorp
Автор

"Cut the QA Dept. We haven't had an issue in years!"

CompassionCrew
Автор

At this point, the real question is how long will it be before the wikipedia moderators need to change "is" to "was" on Crowdstrike's wikipedia page.

Seed
Автор

As someone who works in IT and has been leading employees through safe mode, bitlocker, and into system32, I can safely say that today has been a shit show. Though it's also days like today that show me how much I love what I do. I've definitely earned my weekend this weekend....if I even get one 😅

Modern-Nerds
Автор

"You can't hack a system if the system doesn't work! " - Cybersecurity intern pushing the update

arshackerofficial
Автор

Remember kids, when its a friday just push that shit to production and go home.

Jack-yzws
Автор

When the anti ransomware ransomwares you.

djdrastic
Автор

I’m surprised it’s been so easily accepted as a “mistake”. The fact that if you simply tested this on 1 windows machine before rollout you would’ve know what you were in for. There is zero excuse for this, I wouldn’t even call in incompetency with the size of the org and client scale we are talking about here.

Whatthellisthisthing
Автор

My favorite quote from the matter is the one line in the summary " CrowdStrike is aware of reports of crashes on Windows hosts related to the Falcon Sensor." straight out of the drake and josh. oh really when did you notice was it when you went to get a coffee from fliping Starbucks.

ellixiem
Автор

Y2K in modern day. We love to see it, only now it's actually called Y24

itsjustbusiness
Автор

The irony of a cybersec company doing worse damage than the hackers/hacks it claims to protect against is so funny. You can combine all hacker groups and still they won't be able to wreak so much havoc.

This also begs the question - why does so much of the world's critical infrastructure depends on a closed source OS and a tool with kernal level access on that same OS.

If anything, CrowdStrike just put up a neon sign saying "We could be your next surface for a global supply chain attack"

wlockuz
Автор

Absolutely humiliating. Sophos and Kaspersky must be popping bottles of Champaign and getting every sales rep on payroll ready for the calls on Monday.

hawksnake
Автор

Scary how much of our infrastructure runs on proprietary software

UserMax
Автор

The severity and scope of this is really unacceptable. And I already know that nobody will be held accountable.

Trome
Автор

You were insanely quick to release a video about this. Would love to see more of these "it happened just now" type of videos.

Smarts
Автор

So, if you exploit CrowdStrike, you pwn the world? And companies are fine being this centralized?

Chuck
Автор

Just spent 13 hours at intel in Ireland trying to fix this... it was hell.... Fun fact the boot to safe mode dosnt work half of the time

evilontoast
Автор

that's why automatic uncontrolled updates is worst of a kind.

digitalk
Автор

Crowdstrike committed _two_ cardinal DevOps sins simultaniously: _never deploy to prod on a Friday_ (self explanatory), and _never break rollback_ (having to physically and manually go to each machine to repair it definitely counts as "breaking rollback").

WackoMcGoose
Автор

Waking up knowing I did not have to deal with this was a relief.

pcap_pirate