
August 8, 2024
The recent IT outage experienced by CrowdStrike served as a preparatory exercise for a potential cyber-attack on critical infrastructure, potentially orchestrated by a nation-state like China. Jen Easterly, director of the U.S. Cybersecurity and Infrastructure Security Agency (CISA), emphasized the importance of building network resilience and reducing recovery times to withstand significant disruptions. Historical context includes the Volt Typhoon actors, state-sponsored by China, infiltrating U.S. critical infrastructure. Lessons from the CrowdStrike incident highlighted the need for collaboration, robust software design, and enhanced organizational resilience to preemptively address threats. Felicity Oswald of the UK's National Cybersecurity Centre underscored the importance of clear communication and support to handle such incidents effectively.
CrowdStrike Outage Serves as Dress Rehearsal for Chinese Cyber-Attacks infosecurity-magazine
August 8, 2024
Delta Air Lines and CrowdStrike are embroiled in a legal dispute following a significant IT outage caused by a faulty CrowdStrike software update that affected over 8.5 million Windows devices. Delta experienced five days of operational disruption, leading to stranded passengers and substantial financial losses amounting to $500 million. Delta claims CrowdStrike failed to provide adequate support, despite offers for free onsite assistance. CrowdStrike denies negligence, attributing some blame to Delta’s disaster recovery plans and questioning why competitors resolved issues more swiftly. Delta plans to pursue litigation, while CrowdStrike urges cooperation to find a resolution.
Crowdstrike: Delta Air Lines refused free help to resolve IT outage Bleeping Computer
August 8, 2024
CrowdStrike has released a detailed root cause analysis of the issues caused by the Falcon sensor update on July 19, 2024, which led to system crashes for some Windows users. The problem stemmed from a mismatch between expected and provided input fields in the sensor's Content Interpreter and a new Template Type introduced earlier in the year. This discrepancy was overlooked during initial testing due to wildcard matching criteria. CrowdStrike has implemented multiple mitigations, including compile-time validation and runtime checks, and engaged third-party security reviews to prevent future occurrences. Approximately 99% of affected Windows sensors were restored by July 29, with a final hotfix due by August 9.
CrowdStrike Publishes Technical Root Cause Analysis of Faulty Falcon Update cybersecuritynews
August 8, 2024
CrowdStrike has published a root cause analysis explaining the Falcon Sensor software update crash known as the "Channel File 291" incident, which affected millions of Windows devices. The issue was traced to a content validation problem arising from a new Template Type designed to detect novel attack techniques on Windows systems. A mismatch between input parameters during content validation resulted in out-of-bounds memory reads, causing system crashes. CrowdStrike has implemented several measures to address the issue, including increased testing, new validation checks, and independent code reviews. Despite these efforts, Delta Air Lines claims the incident cost it $500 million in disruptions and is seeking damages from CrowdStrike and Microsoft. Both companies have responded to the criticism, suggesting Delta's issues may extend beyond the security update.
CrowdStrike Reveals Root Cause of Global System Outages thehackernews.com
August 8, 2024
The recent IT outage experienced by CrowdStrike served as a preparatory exercise for a potential cyber-attack on critical infrastructure, potentially orchestrated by a nation-state like China. Jen Easterly, director of the U.S. Cybersecurity and Infrastructure Security Agency (CISA), emphasized the importance of building network resilience and reducing recovery times to withstand significant disruptions. Historical context includes the Volt Typhoon actors, state-sponsored by China, infiltrating U.S. critical infrastructure. Lessons from the CrowdStrike incident highlighted the need for collaboration, robust software design, and enhanced organizational resilience to preemptively address threats. Felicity Oswald of the UK's National Cybersecurity Centre underscored the importance of clear communication and support to handle such incidents effectively.
CrowdStrike Outage Serves as Dress Rehearsal for Chinese Cyber-Attacks infosecurity-magazine
August 8, 2024
Delta Air Lines and CrowdStrike are embroiled in a legal dispute following a significant IT outage caused by a faulty CrowdStrike software update that affected over 8.5 million Windows devices. Delta experienced five days of operational disruption, leading to stranded passengers and substantial financial losses amounting to $500 million. Delta claims CrowdStrike failed to provide adequate support, despite offers for free onsite assistance. CrowdStrike denies negligence, attributing some blame to Delta’s disaster recovery plans and questioning why competitors resolved issues more swiftly. Delta plans to pursue litigation, while CrowdStrike urges cooperation to find a resolution.
Crowdstrike: Delta Air Lines refused free help to resolve IT outage Bleeping Computer
August 8, 2024
CrowdStrike has released a detailed root cause analysis of the issues caused by the Falcon sensor update on July 19, 2024, which led to system crashes for some Windows users. The problem stemmed from a mismatch between expected and provided input fields in the sensor's Content Interpreter and a new Template Type introduced earlier in the year. This discrepancy was overlooked during initial testing due to wildcard matching criteria. CrowdStrike has implemented multiple mitigations, including compile-time validation and runtime checks, and engaged third-party security reviews to prevent future occurrences. Approximately 99% of affected Windows sensors were restored by July 29, with a final hotfix due by August 9.
CrowdStrike Publishes Technical Root Cause Analysis of Faulty Falcon Update cybersecuritynews
August 8, 2024
CrowdStrike has published a root cause analysis explaining the Falcon Sensor software update crash known as the "Channel File 291" incident, which affected millions of Windows devices. The issue was traced to a content validation problem arising from a new Template Type designed to detect novel attack techniques on Windows systems. A mismatch between input parameters during content validation resulted in out-of-bounds memory reads, causing system crashes. CrowdStrike has implemented several measures to address the issue, including increased testing, new validation checks, and independent code reviews. Despite these efforts, Delta Air Lines claims the incident cost it $500 million in disruptions and is seeking damages from CrowdStrike and Microsoft. Both companies have responded to the criticism, suggesting Delta's issues may extend beyond the security update.
CrowdStrike Reveals Root Cause of Global System Outages thehackernews.com

Questions about the Podcast?
Contact us with any questions, requests, or comments about the show. We love hearing your feedback.

© Copyright 2024 Health Lyrics All rights reserved