At-Bay Security is monitoring the unfolding system outage that has been reported by CrowdStrike, and we are working with customers that may be impacted directly or indirectly by related outages. Additionally, At-Bay has become aware of attempts by cyber threat groups to perform social engineering attacks by contacting businesses posing as CrowdStrike representatives in order to offer technical support. Their intent appears to be to exploit potential victims of the system outage in order to gain sensitive information such as login credentials or to convince them to unwittingly install malware. At this time, social engineering attempts appear to be opportunistic, since they are impacting organizations that don’t have CrowdStrike products deployed in addition to those that do. However, any company that is publicly known to be experiencing a system outage concurrent with the CrowdStrike outage may be assumed to be running a CrowdStrike product by attackers. So, companies that have reported an outage to their stakeholders might be targeted as news of their situation becomes public. If you or a member of your organization are contacted by an unknown person offering support related to the CrowdStrike outage, we recommend that you verify their identity with a known individual (e.g., your assigned CrowdStrike account representative or a known representative of the provider of your CrowdStrike software) before sharing sensitive information or providing access to your technology environment. Questions about this advisory may be directed to At-Bay’s security team at [email protected].
At-Bay’s Post
More Relevant Posts
-
Cyber liability is more important now than it ever has been before. To all Crowdstrike users, I do hope your businesses did not suffer too much as a result of the shutdown. Some key coverages that your business should prioritize are a) social engineering as many fraudsters will attempt to take advantage of the current climate by impersonating your Helpdesk or an IT person claiming to offer assistance ; and b) business interruption / income lost due to a cyber attack. Protect yourself and your business! #teamcrc #cyberliability
At-Bay Security is monitoring the unfolding system outage that has been reported by CrowdStrike, and we are working with customers that may be impacted directly or indirectly by related outages. Additionally, At-Bay has become aware of attempts by cyber threat groups to perform social engineering attacks by contacting businesses posing as CrowdStrike representatives in order to offer technical support. Their intent appears to be to exploit potential victims of the system outage in order to gain sensitive information such as login credentials or to convince them to unwittingly install malware. At this time, social engineering attempts appear to be opportunistic, since they are impacting organizations that don’t have CrowdStrike products deployed in addition to those that do. However, any company that is publicly known to be experiencing a system outage concurrent with the CrowdStrike outage may be assumed to be running a CrowdStrike product by attackers. So, companies that have reported an outage to their stakeholders might be targeted as news of their situation becomes public. If you or a member of your organization are contacted by an unknown person offering support related to the CrowdStrike outage, we recommend that you verify their identity with a known individual (e.g., your assigned CrowdStrike account representative or a known representative of the provider of your CrowdStrike software) before sharing sensitive information or providing access to your technology environment. Questions about this advisory may be directed to At-Bay’s security team at [email protected].
To view or add a comment, sign in
-
🔒 In a recent incident, TeamViewer demonstrated the power of strong network segmentation in stopping APT29, aka Midnight Blizzard. Despite accessing TeamViewer's corporate network, the attackers were contained, protecting customer data. This incident underscores the critical importance of defence-in-depth strategies. Colortokens champion robust security measures like network segmentation, multifactor authentication, and access control to safeguard your environments. With their defence-in-depth approach, they ensure that even if one layer is breached, your critical data remains protected. Elevate your security game with Colortokens. Be Breach Ready! 🌐💼 If you would like to hear more, please get in contact with me!! #CyberSecurity #DefenceInDepth #NetworkSecurity #Colortokens #DataProtection https://lnkd.in/eNzeMCwF
To view or add a comment, sign in
-
Vectoredge's AI Powered Data Security platform mitigates AI Data Security risks by enhancing protection measures, enabling secure data sharing, and reducing costs and processing time.
Crowdstrike issue: Remediation as per Crowdstrike “By its nature the issue is going to be very hard to resolve once systems are in a reboot loop, says Adam Harrison, managing director at FTI Cybersecurity. “Manual fixes are going to take time for system admins to apply: CrowdStrike can't push a new update remotely to fix. It's going to need manual intervention on each system.” What happened: Crowdstrike is an industry leader in securing endpoints from malware and viruses, and it is used across the globe by airlines, banks, governments, etc. Miles IT uses this software to protect your systems. CrowdStrike published a faulty channel file last night that is causing some Windows systems to error when booting. How do I know if I am affected: If your computer is unable to start normally (you may see a blue screen), this could be a result of the update. Is this a security incident: No, fortunately this is not a security incident/breach. What should I do: We are working to proactively resolve as many of the systems affected as possible. If you are experiencing the issue, the first step is to reboot your computer as that may resolve it. If that doesn’t work, please submit a support request and we will reach out as soon as possible. If you are technical and comfortable, you could attempt the workaround detailed below. Boot Windows into Safe Mode with Networking. Go to C:\Windows\System32\drivers\CrowdStrike Locate and delete file matching "C-00000291*.sys" Boot normally
To view or add a comment, sign in
-
Who is CrowdStrike CrowdStrike is an American cybersecurity company established in 2011, headquartered in Austin, Texas. The company has experienced substantial growth by offering various security services through cloud-based software. It has secured significant funding from esteemed sources like Google Ventures and serves a global clientele, including 538 of the Fortune 1000 companies. However that might change now? As of recent market data, CrowdStrike holds a market value of approximately $83 billion. However, there has been a decline in its stock price during recent trading sessions. This decline is expected to accelerate due to the latest incident. While CrowdStrike primarily focuses on providing cybersecurity solutions to protect against hackers and malware, the company has gained recognition for its involvement in investigating significant data breaches. Notably, CrowdStrike was enlisted by the Democratic National Committee in 2016 to probe the Russian hack of their servers. Furthermore, it was engaged by Sony Pictures to investigate a cyberattack in 2014 that was attributed to North Korea. Some of CrowdStrike's investigations have drawn public attention, including its role in the probe related to Russian interference in the 2016 US election. The company's work was referenced in the first impeachment of Donald Trump. Notably, there have been unfounded claims, notably by Trump himself, linking CrowdStrike to conspiracy theories, suggesting involvement in covering up certain cybersecurity incidents. CrowdStrike’s CEO, George Kurtz, has apologized for the outage, which the company has stated was due to a faulty piece of code. “This is not a security incident or cyberattack. The issue has been identified, isolated and a fixed. We refer customers to the support portal for the latest updates and will continue to provide complete and continuous updates on our website.” The largest IT failure in history? Incident or breach - we might never know. Stay safe, be protected by ORCA.
To view or add a comment, sign in
-
🔒🚨 Breaking News in the Cyberworld! 🚨🔒 🔍 TeamViewer's Security Team recently intercepted an unexpected guest in their network! 👾 Despite the intrusion, customer data and our beloved prod environment remain unscathed! 🙌 🛡️ Stay vigilant, fellow cyber warriors! 🔒 The irregularity detected serves as a chilling reminder for us all to ramp up our defenses. 💂♂️ Here are some key takeaways to ponder in the realm of cybersecurity: 🔐 Remember the importance of regular security audits to catch unwelcome visitors 🚫 🛡️ Implement multi-factor authentication like your cyber life depends on it! 🔑 🔧 Stay updated on the latest patches and security measures – cybercriminals never rest! 🦹♂️ 🔮 My prediction? This incident is a wake-up call for the entire tech community! As we continue to innovate, cybersecurity remains the cornerstone of a solid digital foundation. 💻 Let's band together, share knowledge, and fortify our defenses! 💪 What's your take on this breach, tech gurus? Share your insights below! 👇 #ainews #automatorsolutions #CybersecurityHeroes 🦸♂️🔒 #CyberSecurityAINews ----- Original Publish Date: 2024-06-27 17:43
TeamViewer responds to security 'irregularity' in IT network
theregister.com
To view or add a comment, sign in
-
Securing Endpoints, Securing Enterprises, Securing People 🔐💻📱 | Inside Sales Account Manager SMBs Iberia & BDR Team Manager @ BlackBerry®
⚠️ Did you hear about the recent global website #outage? ⚠️ 🔒 This fact underscores the critical need for robust #cybersecurity. 🌐 At BlackBerry, we’re dedicated to protecting your digital assets against evolving threats. Want to discuss how we can secure your organization? Reach out to me directly! 📞 Read the full story here 👇 #BlackBerry #Cyber #Security #StaySecure
Global website outage caused by CrowdStrike cybersecurity glitch
capitalbrief.com
To view or add a comment, sign in
-
🚨 TeamViewer Security Alert 🚨 On June 26, 2024, TeamViewer detected an irregularity in its corporate IT environment. They immediately activated a response team and brought in cybersecurity experts to investigate and implement fixes. TeamViewer assured that no customer data was affected and their product environment remains secure. An investigation is ongoing, with updates to follow. Stay vigilant and secure your remote access tools. https://bit.ly/3ROFiE9 #CyberSecurity #TeamViewer #DataProtection #CyberAlert
TeamViewer Detects Security Breach in Corporate IT Environment
thehackernews.com
To view or add a comment, sign in
14,732 followers
Billing Specialist, Customer support, Account management, and Sales Associate.
3moIt's time to sell some cyber security insurance.