Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

CrowdStrike & Rubrik Customer Content Update Recovery For Windows Hosts

Joint customers utilizing Rubrik for immutable backup are recommended to utilize Rubrik in-place recoveries for impacted Windows VMware Virtual Machines (VMs), standard VM restores for Azure VMs, AWS EC2 instances, and live mounts for Hyper-V and AHV VMs. For VMware VMs this significantly reduces the recovery time by only recovering the changed blocks required to revert the VM to a snapshot before the 04:09 UTC CrowdStrike host update.

A Brief History of Graduality

In the early hours of July 19th, 2024, CrowdStrike endpoints on Windows machines worldwide received a faulty content update, causing what is shaping up to be the one of the largest global IT outages to date. All over the world reports of Windows workstations and servers stuck in a boot loop with a BSOD were pouring in, impacting airlines, airports, banks, hospitals and many other critical infrastructures such as emergency services call centers, and the list goes on.

How To Protect Your Home Title From Deed Theft

Nowadays, there is an increase in offensive real estate fraud, with potentially disastrous outcomes for homeowners. The practice known as deed fraud or house title theft involves an online scam for a fraudulent transfer of property ownership. Then, in order to make money, thieves can either sell the house, get a mortgage on it, or even rent it out. Home title theft can cause significant financial loss for individuals and families.

What Is an Endpoint Protection Platform (EPP)?

An Endpoint Protection Platform is an endpoint security capability designed to protect systems from compromise by preventing malicious software from executing. It is important to understand that Endpoint Protection is often used in conjunction with Endpoint Detection and Response (EDR), however they are not synonymous. The primary purpose of an EDR solution is to record events as they occur while also providing a means of threat resolution.

How to Protect Your Business from Data Leaks

Friday, Jul 19th, 2024 In this blog, we're going to discuss how you can protect your business from data leaks that can result from insecure application programming interfaces. Cloud native applications are composed of loosely coupled microservices, which are predominantly intercommunicating via APIs.

One Faulty File: Global Disruption

As I write this, billions of users are looking at “the blue screen of death.” Flights are grounded around the world, 9-1-1 service is offline in the entire state of Alaska, hospitals can’t check in patients, retailers cannot make sales because their POS systems are down, Newark airport has reverted to paper tickets for check-in, and countless other organizations are at a standstill. This is the top story on every major news site I’ve checked. What could cause this carnage?

The Cost of Complacency: Analyzing the Financial Impact of Cybersecurity Breaches

In today’s digital landscape, the importance of robust cybersecurity measures cannot be overstated. Yet, despite the clear and present danger posed by cyber threats, many organizations still underinvest in cybersecurity, operating under a false sense of security. This complacency can be incredibly costly, as the financial ramifications of cybersecurity breaches are staggering.

How Cybercriminals Use Breaking News for Phishing Attacks

Trustwave SpiderLabs issued a warning that threat actors may attempt to take advantage of CrowdStrike’s software update that caused widespread outages by using the news as the center of a social engineering scheme to convince people to open malicious phishing emails or fall for other types of attacks. Using this news cycle is nothing new.