<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic CrowdStrike glitch: What caused the global cyber outage? in Industry News</title>
    <link>https://community.isc2.org/t5/Industry-News/ALL-THINGS-CrowdStrike-July-2024-Incident/m-p/72227#M7010</link>
    <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Well many of you have felt the impact of the CrowdStrike issue and it is massive!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;A technical issue, related to a US-based cybersecurity firm named CrowdStrike, caused computers running Microsoft software across Australia and abroad to glitch on Friday.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The global outage impacted a raft of Australian companies and government agencies, causing many computers to attempt to restart and display a blue-screen error message.&lt;/P&gt;&lt;P&gt;Here's what we know so far.&lt;/P&gt;&lt;H3&gt;What is CrowdStrike?&lt;/H3&gt;&lt;P&gt;CrowdStrike is a US-based American cybersecurity firm that helps companies manage their security in "IT environments" - that is, everything they use an internet connection to access.&lt;/P&gt;&lt;P&gt;Its primary function is to protect companies and stop data breaches, ransomware and cyber attacks.&lt;/P&gt;&lt;P&gt;It includes among its main customers global investment banks, universities and even the Australian betting agency TAB Corp.&lt;/P&gt;&lt;P&gt;The cybersecurity environment has changed rapidly in recent years due to the increased presence of threat actors targeting big business, including Ticketmaster, Medibank and Optus.&lt;/P&gt;&lt;P&gt;As a result, more and more companies are turning towards firms like CrowdStrike to protect their customers' information.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.rnz.co.nz/news/national/521777/new-digital-framework-tackles-trust-issues" target="_blank"&gt;https://www.rnz.co.nz/news/national/521777/new-digital-framework-tackles-trust-issues&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;</description>
    <pubDate>Sat, 20 Jul 2024 00:53:04 GMT</pubDate>
    <dc:creator>Caute_cautim</dc:creator>
    <dc:date>2024-07-20T00:53:04Z</dc:date>
    <item>
      <title>ALL THINGS CrowdStrike - July 2024 Incident</title>
      <link>https://community.isc2.org/t5/Industry-News/ALL-THINGS-CrowdStrike-July-2024-Incident/m-p/72327#M7009</link>
      <description>&lt;P&gt;Hi all! There are so many great discussions about CrowdStrike going on in this Community, but we want to bring them together in one place, so that folks can share and discuss efficiently!&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 22 Jul 2024 15:24:39 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/ALL-THINGS-CrowdStrike-July-2024-Incident/m-p/72327#M7009</guid>
      <dc:creator>Kaity</dc:creator>
      <dc:date>2024-07-22T15:24:39Z</dc:date>
    </item>
    <item>
      <title>More Than an Outage</title>
      <link>https://community.isc2.org/t5/Industry-News/ALL-THINGS-CrowdStrike-July-2024-Incident/m-p/72205#M7019</link>
      <description>&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;P&gt;Just to bring everyone up to speed - I was in the dark myself until I started receiving numerous inquiries about the disruptions in their systems. It appears that an outage instigated by CrowdStrike had a ripple effect, impacting airlines, public transit, and healthcare, among other sectors.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;They attributed the incident to a flawed update and assured that there was no malicious activity involved. However, I can't shake off a sense of unease about the whole situation.&lt;/P&gt;&lt;P&gt;I'm eager to know your thoughts on this. What's your take?&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Fri, 19 Jul 2024 21:02:10 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/ALL-THINGS-CrowdStrike-July-2024-Incident/m-p/72205#M7019</guid>
      <dc:creator>EchelonVigil</dc:creator>
      <dc:date>2024-07-19T21:02:10Z</dc:date>
    </item>
    <item>
      <title>Re: More Than an Outage</title>
      <link>https://community.isc2.org/t5/Industry-News/ALL-THINGS-CrowdStrike-July-2024-Incident/m-p/72210#M7020</link>
      <description>&lt;P&gt;Ever sit in an airport and see the screens go blank and then hear that MULTIPLE flights are delayed or cancelled?&amp;nbsp; That's how I spent my morning.......LOL not a fun way to end a work week.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now that I am back in the hotel and reading all the explanations,&amp;nbsp;&lt;A href="https://www.crowdstrike.com/blog/statement-on-falcon-content-update-for-windows-hosts/" target="_blank" rel="noopener"&gt;https://www.crowdstrike.com/blog/statement-on-falcon-content-update-for-windows-hosts/&lt;/A&gt;&amp;nbsp;and claims that this was not a Security breach, I call "Bullxxxx"....can't use the word that I want to here.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This affected the Availability of many systems globally.&amp;nbsp; I really question where their Change Management was....no testing? What happened to the&amp;nbsp;&lt;SPAN&gt;Development/Testing/QA/ Production?&amp;nbsp; A classic fail on their part.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Many organisations were able to recover Manually but the cost of this outage will probably never be known.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;In my case, the airline is providing a hotel room for two nights and two food vouchers.&amp;nbsp; Imagine that cost multiplied by 100 or better 1000&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;At least I got stranded some place fun.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;d&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 19 Jul 2024 22:10:46 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/ALL-THINGS-CrowdStrike-July-2024-Incident/m-p/72210#M7020</guid>
      <dc:creator>dcontesti</dc:creator>
      <dc:date>2024-07-19T22:10:46Z</dc:date>
    </item>
    <item>
      <title>A great write-up (non-technical) on what happened with Crowdstrike this morning (July 19th)</title>
      <link>https://community.isc2.org/t5/Industry-News/ALL-THINGS-CrowdStrike-July-2024-Incident/m-p/72223#M7013</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Thanks to a friend on LinkedIn:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;CrowdStrike are a large security company, based in Austin Texas who provide security software to a great many large enterprises. This morning they released an automatic upgrade to one of their programs called Falcon Sensor. Falcon Sensor is a kind of multi-purpose anti-malware, anti-intrusion system. Unfortunately the upgrade this morning had a serious flaw that caused it to crash computers using Microsoft Windows 10.&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;Falcon Sensor caused what is known as a “kernel panic” state in Windows, which is every bit as bad as it sounds. It immediately caused Windows 10 computers to “blue screen” (crash) and when the computers tried to restart, caused them to crash again. As you might expect, this has caused considerable mayhem.&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;Luckily CrowdStrike and Microsoft can up with a fix very quickly. Microsoft has a “safe boot” mode that allows you to start a Windows computer in a way that does not load Falcon Sensor. This allows the IT guys to fix the problem without the Falcon Sensor system crashing the computer before they can get to it.&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;Manually fixing thousands of computers is not going to be fun. Many IT people are currently cursing CrowdStrike for releasing their upgrade on a Friday. Many people’s weekends have been trashed. But that is not the worst of it.&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;Some versions of Windows, particularly virtual machines running on cloud services like, for example, Amazon Web Services cannot be put into safe mode. This means to be fixed they have to be transferred to a server where they can be fixed then moved back to their original location. This is nowhere near as easy as it sounds. And that is still not the biggest problem.&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;The problem is that many of the companies that use CrowdStrike are very security conscious. This means their servers are encrypted. To put those servers into safe mode you have to release the encryption using what are known as recovery keys. The problem is, many companies will have their recovery keys stored on servers affected by the problem, leaving them with a potentially difficult to solve Catch 22.&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;In the next few hours and days we’re going to find out which companies have really thought through their disaster recovery measures. Those who have not are going to be rebuilding a lot of servers from scratch.&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;Anyway, that’s why your IT guy is very unhappy today (or indulging in a bit of schadenfreude.) The ironic thing is that companies who are worst affected by this are probably the most security conscious, which is why we’re seeing a lot of banks and airlines in trouble.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 19 Jul 2024 22:45:14 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/ALL-THINGS-CrowdStrike-July-2024-Incident/m-p/72223#M7013</guid>
      <dc:creator>dcontesti</dc:creator>
      <dc:date>2024-07-19T22:45:14Z</dc:date>
    </item>
    <item>
      <title>Re: More Than an Outage</title>
      <link>https://community.isc2.org/t5/Industry-News/ALL-THINGS-CrowdStrike-July-2024-Incident/m-p/72224#M7021</link>
      <description>&lt;P&gt;You hit the nail on the head of everything I was thinking, thank you.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm sorry you had to experience that.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I was asked if I thought this was a cyberattack. My guess, this was either an insider threat or someone was rushing and clicked on something "phishy".&lt;/P&gt;</description>
      <pubDate>Fri, 19 Jul 2024 23:27:02 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/ALL-THINGS-CrowdStrike-July-2024-Incident/m-p/72224#M7021</guid>
      <dc:creator>EchelonVigil</dc:creator>
      <dc:date>2024-07-19T23:27:02Z</dc:date>
    </item>
    <item>
      <title>CrowdStrike glitch: What caused the global cyber outage?</title>
      <link>https://community.isc2.org/t5/Industry-News/ALL-THINGS-CrowdStrike-July-2024-Incident/m-p/72227#M7010</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Well many of you have felt the impact of the CrowdStrike issue and it is massive!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;A technical issue, related to a US-based cybersecurity firm named CrowdStrike, caused computers running Microsoft software across Australia and abroad to glitch on Friday.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The global outage impacted a raft of Australian companies and government agencies, causing many computers to attempt to restart and display a blue-screen error message.&lt;/P&gt;&lt;P&gt;Here's what we know so far.&lt;/P&gt;&lt;H3&gt;What is CrowdStrike?&lt;/H3&gt;&lt;P&gt;CrowdStrike is a US-based American cybersecurity firm that helps companies manage their security in "IT environments" - that is, everything they use an internet connection to access.&lt;/P&gt;&lt;P&gt;Its primary function is to protect companies and stop data breaches, ransomware and cyber attacks.&lt;/P&gt;&lt;P&gt;It includes among its main customers global investment banks, universities and even the Australian betting agency TAB Corp.&lt;/P&gt;&lt;P&gt;The cybersecurity environment has changed rapidly in recent years due to the increased presence of threat actors targeting big business, including Ticketmaster, Medibank and Optus.&lt;/P&gt;&lt;P&gt;As a result, more and more companies are turning towards firms like CrowdStrike to protect their customers' information.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.rnz.co.nz/news/national/521777/new-digital-framework-tackles-trust-issues" target="_blank"&gt;https://www.rnz.co.nz/news/national/521777/new-digital-framework-tackles-trust-issues&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;</description>
      <pubDate>Sat, 20 Jul 2024 00:53:04 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/ALL-THINGS-CrowdStrike-July-2024-Incident/m-p/72227#M7010</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2024-07-20T00:53:04Z</dc:date>
    </item>
    <item>
      <title>Re: A great write-up (non-technical) on what happened with Crowdstrike this morning (July 19th)</title>
      <link>https://community.isc2.org/t5/Industry-News/ALL-THINGS-CrowdStrike-July-2024-Incident/m-p/72228#M7014</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/715155969"&gt;@dcontesti&lt;/a&gt;. A great explanation, by the way it is not a cyber security incident:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;CrowdStrike outage shows New Zealand's critical technology dependencies&amp;nbsp;&lt;/STRONG&gt;&lt;BR /&gt;&lt;SPAN&gt;The New Zealand Internet Task Force is tonight reminding people that the basics are what keep our online lives safe after the wide scale CrowdStrike outage has impacted services nationally and internationally.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;“While there is no indication that there is anything malicious behind the outages that kiwis are experiencing to services tonight, it’s a solid reminder that our lives are firmly intertwined with online services” says Tandi McCarthy, New Zealand Internet Task Force spokesperson.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;The outage is the result of an update to CrowdStrike Falcon,&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;security&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;software that protects systems from viruses and other threats. Affected organisations and their IT specialists should make sure that they are connected with Crowdstrike through the formal support channels to receive the correct fix and guidance.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;“It’s scary how business as usual changes can take whole systems offline. We are seeing the wide scale and potentially physically harmful effects that a big outage can have. Our peers in Australia and further afield are seeing outages impact healthcare and transport, among other industries.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;“There is a fix in place from CrowdStrike, but it’ll take time for organisations to work through and implement it and this will be different for every organisation. People are going to be working really hard, and likely throughout the night and weekend, to get this sorted.”&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Incidents like this are a reminder that organisations should understand and document their dependencies on systems and how to get help when something goes wrong.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ENDS&lt;/SPAN&gt;&lt;BR /&gt;&lt;I&gt;The New Zealand Internet Task Force (&lt;/I&gt;&lt;I&gt;&lt;A class="" href="https://urldefense.proofpoint.com/v2/url?u=https-3A__nzitf.org.nz_&amp;amp;d=DwMFaQ&amp;amp;c=BSDicqBQBDjDI9RkVyTcHQ&amp;amp;r=BmwZeJ57gCSSsiEl-d1pARRD7IO3bCyfDkD2YPnpyoM&amp;amp;m=sw-0E4c8PIKwCeNOSOGTzgBD9hyG6e8ekEQ2Q1e2z5W94DFLobvGP7B0zuNt6_s2&amp;amp;s=-_QL4zDyaBEx7tdXyQS_bHnESTq8MCgls3SHvjDnQXI&amp;amp;e=" target="_blank" rel="noopener noreferrer"&gt;NZITF&lt;/A&gt;&lt;/I&gt;&lt;I&gt;) is a non-profit organisation with the mission of improving the cyber&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/I&gt;&lt;SPAN class=""&gt;&lt;I&gt;security&lt;/I&gt;&lt;/SPAN&gt;&lt;I&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;posture of New Zealand. Our members are IT&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/I&gt;&lt;SPAN class=""&gt;&lt;I&gt;security&lt;/I&gt;&lt;/SPAN&gt;&lt;I&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;professionals who work together through trusted forums to make the Internet safer for all New Zealanders.&lt;/I&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;I&gt;Regards&lt;/I&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;I&gt;Caute_Cautim&lt;/I&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 20 Jul 2024 00:58:47 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/ALL-THINGS-CrowdStrike-July-2024-Incident/m-p/72228#M7014</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2024-07-20T00:58:47Z</dc:date>
    </item>
    <item>
      <title>Re: A great write-up (non-technical) on what happened with Crowdstrike this morning (July 19th)</title>
      <link>https://community.isc2.org/t5/Industry-News/ALL-THINGS-CrowdStrike-July-2024-Incident/m-p/72229#M7015</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Reminder:&amp;nbsp;&lt;SPAN&gt;While there’s&lt;/SPAN&gt;&lt;SPAN&gt; no indication that there is anything malicious behind the outages, this incident is already being exploited for phishing and malware delivery. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Regards&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Caute_Cautim&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 20 Jul 2024 01:00:23 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/ALL-THINGS-CrowdStrike-July-2024-Incident/m-p/72229#M7015</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2024-07-20T01:00:23Z</dc:date>
    </item>
    <item>
      <title>Re: CrowdStrike glitch: What caused the global cyber outage?</title>
      <link>https://community.isc2.org/t5/Industry-News/ALL-THINGS-CrowdStrike-July-2024-Incident/m-p/72230#M7011</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;SPAN&gt;For those thinking about our dependence on key systems as a society in the aftermath of the Crowdstrike deployment failure, can I suggest that you read E.M. Forster's short story, the Machine Stops, written in 1909.&lt;BR /&gt;&lt;BR /&gt;In a future version of planet Earth, most of the human population doesn’t venture above ground. Rarely do they even leave their own rooms, in which all of their needs are met by the Machine.&lt;BR /&gt;&lt;BR /&gt;The Machine allows the humans to communicate “ideas” with one another, which is essentially their only activity. It doesn’t stop them from leaving their rooms, but they have little desire to do so anyway. They’ve started to believe the Machine is omnipotent and omniscient, not to be questioned. And when it begins to malfunction, they trust that it knows what it’s doing—forgetting they invented it in the first place&amp;nbsp;.&amp;nbsp;.&amp;nbsp;.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.amazon.com/Machine-Stops-M-Forster-ebook/dp/B085G4HBRX" target="_blank" rel="noopener"&gt;https://www.amazon.com/Machine-Stops-M-Forster-ebook/dp/B085G4HBRX&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 20 Jul 2024 01:40:06 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/ALL-THINGS-CrowdStrike-July-2024-Incident/m-p/72230#M7011</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2024-07-20T01:40:06Z</dc:date>
    </item>
    <item>
      <title>Falcon Sensor Content Issue from July 19, 2024, Likely Used to Target CrowdStrike Customers</title>
      <link>https://community.isc2.org/t5/Industry-News/ALL-THINGS-CrowdStrike-July-2024-Incident/m-p/72231#M7023</link>
      <description>&lt;P&gt;HI All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On July 19, 2024, an issue present in a single content update for the CrowdStrike Falcon® sensor impacting Windows operating systems was identified, and a fix was deployed.1&lt;/P&gt;&lt;P&gt;CrowdStrike Intelligence has monitored for malicious activity leveraging the event as a lure theme and received reports that threat actors are conducting the following activity:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Sending phishing emails posing as CrowdStrike support to customers&lt;/LI&gt;&lt;LI&gt;Impersonating CrowdStrike staff in phone calls&lt;/LI&gt;&lt;LI&gt;Posing as independent researchers, claiming to have evidence the technical issue is linked to a cyberattack and offering remediation insights&lt;/LI&gt;&lt;LI&gt;Selling scripts purporting to automate recovery from the content update issue&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;A href="https://www.crowdstrike.com/blog/falcon-sensor-issue-use-to-target-crowdstrike-customers/" target="_blank" rel="noopener"&gt;https://www.crowdstrike.com/blog/falcon-sensor-issue-use-to-target-crowdstrike-customers/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 20 Jul 2024 01:46:40 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/ALL-THINGS-CrowdStrike-July-2024-Incident/m-p/72231#M7023</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2024-07-20T01:46:40Z</dc:date>
    </item>
    <item>
      <title>Re: A great write-up (non-technical) on what happened with Crowdstrike this morning (July 19th)</title>
      <link>https://community.isc2.org/t5/Industry-News/ALL-THINGS-CrowdStrike-July-2024-Incident/m-p/72232#M7016</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/809125741"&gt;@Caute_cautim&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;A great explanation, by the way it is not a cyber security incident:&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;I would prefer wording like "Not a malicious security incident." It is a cybersecurity incident; checks, balances, and testing that should have been in place weren't there to guard against a catastrophic failure.&lt;/P&gt;</description>
      <pubDate>Sat, 20 Jul 2024 01:59:16 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/ALL-THINGS-CrowdStrike-July-2024-Incident/m-p/72232#M7016</guid>
      <dc:creator>JoePete</dc:creator>
      <dc:date>2024-07-20T01:59:16Z</dc:date>
    </item>
    <item>
      <title>Re: More Than an Outage</title>
      <link>https://community.isc2.org/t5/Industry-News/ALL-THINGS-CrowdStrike-July-2024-Incident/m-p/72233#M7022</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/715155969"&gt;@dcontesti&lt;/a&gt;&amp;nbsp;wrote:&lt;P&gt;This affected the Availability of many systems globally.&amp;nbsp; I really question where their Change Management was....no testing? What happened to the&amp;nbsp;&lt;SPAN&gt;Development/Testing/QA/ Production?&amp;nbsp; A classic fail on their part.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Absolutely. It may not have been malicious, but it most certainly is a security incident. Otherwise, 90 percent of the CVE "isn't a security incident."&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Part of this is the hazard of uniformity in systems, but this also highlights the hazard of supply-chain attacks. Think about it; you have all these Windows systems bricked by a third-party application. Isn't this what everyone is squealing about these days with "zero trust?"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 20 Jul 2024 02:07:30 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/ALL-THINGS-CrowdStrike-July-2024-Incident/m-p/72233#M7022</guid>
      <dc:creator>JoePete</dc:creator>
      <dc:date>2024-07-20T02:07:30Z</dc:date>
    </item>
    <item>
      <title>Re: A great write-up (non-technical) on what happened with Crowdstrike this morning (July 19th)</title>
      <link>https://community.isc2.org/t5/Industry-News/ALL-THINGS-CrowdStrike-July-2024-Incident/m-p/72238#M7017</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/809125741"&gt;@Caute_cautim&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1005241419"&gt;@JoePete&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So my take, while maybe not malicious, I tend to think of this in terms of a Security Breach.&amp;nbsp; The basis for most things we do in Security is CIA, although of late, Integrity and Availability are not discussed as much as Confidentiality.&amp;nbsp; Also when computers start blue screening for no apparent reason, Security always get tapped to work on the issue.&amp;nbsp; From past experiences, most people think that seeing the Blue Screen indicates they have been hacked.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I believe this is a colossal failure in their (CrowdStrike) Change Management processes (development/testing/QA and finally deployment).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I also question the contracts in place with CrowdStrike that allows them to automatically push a patch/fix to systems without (so it seems) proper notification.&amp;nbsp; Not sure about others but we do not even let M$ push patches without our knowledge.&amp;nbsp; Whilst they may be downloaded automatically, they are not deployed until they are tested in house.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Total failure;&amp;nbsp; Management 101 gets an F- for CrowdStrike.&amp;nbsp; To those that have cntracts with CrowdStrike also an F-.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;d&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 20 Jul 2024 09:19:31 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/ALL-THINGS-CrowdStrike-July-2024-Incident/m-p/72238#M7017</guid>
      <dc:creator>dcontesti</dc:creator>
      <dc:date>2024-07-20T09:19:31Z</dc:date>
    </item>
    <item>
      <title>Re: CrowdStrike glitch: What caused the global cyber outage?</title>
      <link>https://community.isc2.org/t5/Industry-News/ALL-THINGS-CrowdStrike-July-2024-Incident/m-p/72239#M7012</link>
      <description>&lt;P&gt;Thanks for sharing this information with us&amp;nbsp;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/809125741"&gt;@Caute_cautim&lt;/a&gt;.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 20 Jul 2024 07:10:11 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/ALL-THINGS-CrowdStrike-July-2024-Incident/m-p/72239#M7012</guid>
      <dc:creator>Kyaw_Myo_Oo</dc:creator>
      <dc:date>2024-07-20T07:10:11Z</dc:date>
    </item>
    <item>
      <title>Another outage caused by CrowdStrike (no one noticed)</title>
      <link>https://community.isc2.org/t5/Industry-News/ALL-THINGS-CrowdStrike-July-2024-Incident/m-p/72257#M7028</link>
      <description>&lt;DIV class=""&gt;&lt;H1&gt;&lt;FONT size="4"&gt;&lt;SPAN class=""&gt;CrowdStrike took down Debian and Rocky Linux a few months ago and no one noticed&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/H1&gt;&lt;DIV class=""&gt;Despite being a leading cybersecurity firm, CrowdStrike’s approach to pushing updates without extensive testing across all configurations is troubling.&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;A href="https://stackdiary.com/crowdstrike-took-down-debian-and-rocky-linux-a-few-months-ago-and-no-one-noticed/" target="_blank" rel="noopener"&gt;https://stackdiary.com/crowdstrike-took-down-debian-and-rocky-linux-a-few-months-ago-and-no-one-noticed/&lt;/A&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class=""&gt;I agree with the author 100%, total failure on CrowdStrike's part in Management 101.&lt;/DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class=""&gt;d&lt;/DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Sat, 20 Jul 2024 23:53:52 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/ALL-THINGS-CrowdStrike-July-2024-Incident/m-p/72257#M7028</guid>
      <dc:creator>dcontesti</dc:creator>
      <dc:date>2024-07-20T23:53:52Z</dc:date>
    </item>
    <item>
      <title>Birdstrike - How Crowdstrike smashed much of our IT infrastructure.</title>
      <link>https://community.isc2.org/t5/Industry-News/ALL-THINGS-CrowdStrike-July-2024-Incident/m-p/72262#M7025</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;Ah, birds and windows… avians and glass panels… locked in an eternal battle that, to be fair, the window wins 99% of the time. Not in this instance though.&lt;/P&gt;&lt;P class=""&gt;Silly metaphor aside, this recent Crowdstrike vs. Windows debacle is serious, in fact I’d say that this is the incident Y2K wishes it was.&lt;/P&gt;&lt;P class=""&gt;Want to know what happened? Grab yourself a cup of tea and read on.&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;A href="https://www.linkedin.com/pulse/birdstrike-how-crowdstrike-smashed-much-our-liam-sutton-fczkc/?trackingId=ILqAFgOyZqu6jTNNttU2BQ%3D%3D" target="_blank" rel="noopener"&gt;https://www.linkedin.com/pulse/birdstrike-how-crowdstrike-smashed-much-our-liam-sutton-fczkc/?trackingId=ILqAFgOyZqu6jTNNttU2BQ%3D%3D&lt;/A&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;Regards&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;Caute_Cautim&lt;/P&gt;</description>
      <pubDate>Sun, 21 Jul 2024 03:36:41 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/ALL-THINGS-CrowdStrike-July-2024-Incident/m-p/72262#M7025</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2024-07-21T03:36:41Z</dc:date>
    </item>
    <item>
      <title>Re: Another outage caused by CrowdStrike (no one noticed)</title>
      <link>https://community.isc2.org/t5/Industry-News/ALL-THINGS-CrowdStrike-July-2024-Incident/m-p/72263#M7029</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/715155969"&gt;@dcontesti&lt;/a&gt;The mainframe users are glad they were not affected at all....&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;</description>
      <pubDate>Sun, 21 Jul 2024 03:39:26 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/ALL-THINGS-CrowdStrike-July-2024-Incident/m-p/72263#M7029</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2024-07-21T03:39:26Z</dc:date>
    </item>
    <item>
      <title>Breaking! Hackers Started Exploiting CrowdStrike Issue in Cyber Attacks - Beware</title>
      <link>https://community.isc2.org/t5/Industry-News/ALL-THINGS-CrowdStrike-July-2024-Incident/m-p/72268#M7024</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Cybersecurity experts have uncovered a concerning development following the recent&lt;/SPAN&gt; &lt;A class="" href="https://cyberpress.org/crowdstrike-update-triggers-endless-bsod/" target="_self"&gt;CrowdStrike Falcon sensor issue&lt;/A&gt; &lt;SPAN&gt;that affected Windows systems on July 19, 2024. Threat actors are now actively exploiting this incident to target CrowdStrike customers through various malicious activities.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://www.linkedin.com/pulse/breaking-hackers-started-exploiting-crowdstrike-issue-ie2ec/?trackingId=4kOMsknazEHDymL8Oo%2BQhQ%3D%3D" target="_blank" rel="noopener"&gt;https://www.linkedin.com/pulse/breaking-hackers-started-exploiting-crowdstrike-issue-ie2ec/?trackingId=4kOMsknazEHDymL8Oo%2BQhQ%3D%3D&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Well we knew it was only a matter of time...............&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;d&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 21 Jul 2024 07:56:01 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/ALL-THINGS-CrowdStrike-July-2024-Incident/m-p/72268#M7024</guid>
      <dc:creator>dcontesti</dc:creator>
      <dc:date>2024-07-21T07:56:01Z</dc:date>
    </item>
    <item>
      <title>Re: Another outage caused by CrowdStrike (no one noticed)</title>
      <link>https://community.isc2.org/t5/Industry-News/ALL-THINGS-CrowdStrike-July-2024-Incident/m-p/72269#M7030</link>
      <description>&lt;P&gt;Smiles.&amp;nbsp; When I first started at my company (too many years ago)......the mainframe was going away.............Its still there and working.&lt;/P&gt;</description>
      <pubDate>Sun, 21 Jul 2024 07:58:26 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/ALL-THINGS-CrowdStrike-July-2024-Incident/m-p/72269#M7030</guid>
      <dc:creator>dcontesti</dc:creator>
      <dc:date>2024-07-21T07:58:26Z</dc:date>
    </item>
    <item>
      <title>Re: A great write-up (non-technical) on what happened with Crowdstrike this morning (July 19th)</title>
      <link>https://community.isc2.org/t5/Industry-News/ALL-THINGS-CrowdStrike-July-2024-Incident/m-p/72275#M7018</link>
      <description>This, is definitely a security incident. It violates, one of the core security principles… Availability.</description>
      <pubDate>Sun, 21 Jul 2024 17:22:37 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/ALL-THINGS-CrowdStrike-July-2024-Incident/m-p/72275#M7018</guid>
      <dc:creator>JMan1</dc:creator>
      <dc:date>2024-07-21T17:22:37Z</dc:date>
    </item>
  </channel>
</rss>

