easy-basic-authentication domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/molagroup/public_html/molaprise.com/uat/wp-includes/functions.php on line 6121We\u2019re back with the latest on the CrowdStrike issue. CrowdStrike recently released an elaborate 12-page report titled the <\/span>Channel file 291 Incident Root Cause Analysis<\/span><\/a>. Today we’re breaking down this technical document into simple terms starting with a quick rundown of events.<\/span>\u00a0<\/span><\/p>\n On July 19, 2024, CrowdStrike discovered a bug in their security software that caused Windows to crash. This impacted everything from airlines to banks to healthcare systems in many countries. Again, it wasn\u2019t a cyberattack. Just the software trying to read more information from memory than it should\u2019ve. <\/span>For insights on how Molaprise can assist with these issues, check our previous blog<\/a>!<\/span><\/p>\n <\/p>\n Imagine trying to grab 21 pieces of data when there are only 20 pieces available – that\u2019s exactly what this software did. Its attempt to read more information from the computer’s memory than was available (an out-of-bounds read) caused the system to crash. The root cause was a coding error in a new feature which was overlooked during testing and deployment. It wasn\u2019t a security risk however because hackers couldn\u2019t do anything harmful like stealing your data and CrowdStrike\u2019s software has <\/span>several layers of protection<\/span><\/a>.<\/span> In view of that certain measures were taken:<\/span><\/p>\n <\/p>\n <\/p>\n Once the outage gained media attention, the <\/span>NCSC observed an increase in phishing<\/span><\/a>, <\/span>domains & URLs impersonating CrowdStrike<\/span><\/a> and the distribution of malware disguised as recovery software and <\/span>security updates<\/span><\/a>\u00a0by attackers.<\/span>\u00a0<\/span><\/p>\n CrowdStrike is currently working on improving their security and appreciates feedback from the security community. They even have a <\/span>Bug Bounty program<\/span><\/a> to find and fix potential issues.<\/span>\u00a0<\/span><\/p>\nBug Details<\/span><\/b>\u00a0<\/span><\/h2>\n
\n
CrowdStrike\u2019s Layers of Protection<\/span><\/b>\u00a0<\/span><\/h2>\n
\n
The Wake of The Incident<\/span><\/b>\u00a0<\/span><\/h2>\n