CrowdStrike Auto-Update Disaster - Threat Talks Cybersecurity Podcast
Listen now
Description
☠️ CrowdStrike: 8.5 million blue screens of death ☠️ Did you know that last July’s CrowdStrike outage led to closed airports, inaccessible bank accounts and hospitals that were only delivering emergency care that did not require any computers?   In this Threat Talk, Lieuwe Jan Koning is joined by Rob Maas and Jeroen Scheerder as they discuss the CrowdStrike outage and, more importantly, what could have been done to prevent such an impactful event from happening in the first place.   What exactly are the inherent risks of automatic updates? And can they be set up in such a way that what happened with CrowdStrike won’t happen again? 🔔 Follow and Support our channel! 🔔 === ► YOUTUBE: https://youtube.com/@ThreatTalks ► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E ► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520 👕 Get your own Threat Talks T-shirt https://threat-talks.com/breaking-the-illusion-exposing-security-fallacies/ 🗾 Explore the CrowdStrike Outage's Details 🗾 Our exclusive infographic maps out the step-by-step tactics hackers use to exploit these vulnerabilities. Perfect for IT teams and Information Security Officers, it’s designed to help you stay one step ahead. https://on2it.s3.us-east-1.amazonaws.com/Infographic-security-fallacies.pdf 🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX
More Episodes
🔍 Breaking the Illusion: Confronting Cybersecurity’s Biggest Fallacies 🔍 Think you know the route a hacker might take? Think again! In this eye-opening Threat Talk, Lieuwe Jan Koning dives into the critical fallacies of cybersecurity with top experts Fleur van Leusden, CISO and host of CISO...
Published 11/05/24
Imagine creating millions in cryptocurrency…without spending a cent. 💸 🔍 Explore the Binance BNB Chain Attack, where attackers used cross-chain bridges to create crypto assets out of thin air. 👾 Dive into the exploit’s details, from blockchain’s cryptographic structures to vulnerabilities...
Published 10/29/24