Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
Artwork

Content provided by David Kopec, Rebecca Kopec, David Kopec, and Rebecca Kopec. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by David Kopec, Rebecca Kopec, David Kopec, and Rebecca Kopec or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://staging.podcastplayer.com/legal.
Player FM - Podcast App
Go offline with the Player FM app!

#134 The CrowdStrike Incident

15:47
 
Share
 

Manage episode 433811924 series 2709740
Content provided by David Kopec, Rebecca Kopec, David Kopec, and Rebecca Kopec. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by David Kopec, Rebecca Kopec, David Kopec, and Rebecca Kopec or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://staging.podcastplayer.com/legal.

On July 19th, 2024, the cybersecurity firm CrowdStrike released an update for its Falcon Sensor software that brought down millions of Windows computers around the world. Some of these computers were involved in critical infrastructure like airlines, hospitals, and governments. Falcon Sensor, which hooks into the Windows kernel, was certified by Microsoft and cryptographically signed. The update triggered a classic (and common) bug reading past the end of an array. It not only crashed Windows, but didn't even allow it to complete its boot process. In this episode we explain what the bug was and why CrowdStrike did not catch it before it had the opportunity to bring down millions of machines.

Show Notes

Follow us on X @KopecExplains.

Theme “Place on Fire” Copyright 2019 Creo, CC BY 4.0

Find out more at http://kopec.live

Read transcript


  continue reading

140 episodes

Artwork

#134 The CrowdStrike Incident

Kopec Explains Software

11 subscribers

published

iconShare
 
Manage episode 433811924 series 2709740
Content provided by David Kopec, Rebecca Kopec, David Kopec, and Rebecca Kopec. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by David Kopec, Rebecca Kopec, David Kopec, and Rebecca Kopec or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://staging.podcastplayer.com/legal.

On July 19th, 2024, the cybersecurity firm CrowdStrike released an update for its Falcon Sensor software that brought down millions of Windows computers around the world. Some of these computers were involved in critical infrastructure like airlines, hospitals, and governments. Falcon Sensor, which hooks into the Windows kernel, was certified by Microsoft and cryptographically signed. The update triggered a classic (and common) bug reading past the end of an array. It not only crashed Windows, but didn't even allow it to complete its boot process. In this episode we explain what the bug was and why CrowdStrike did not catch it before it had the opportunity to bring down millions of machines.

Show Notes

Follow us on X @KopecExplains.

Theme “Place on Fire” Copyright 2019 Creo, CC BY 4.0

Find out more at http://kopec.live

Read transcript


  continue reading

140 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play