#crowdstrike
putting Crowdstrike branding on the hood of the safety car is a bold move, Mercedes
November 8, 2025 at 2:17 PM
Crowdstrike claims Scattered Spider planned to have accomplices physically travel to target company offices to connect to WiFi and enable access to target networks.
www.theregister.com/2025/11/04/c...
November 5, 2025 at 11:49 AM
CrowdStrike 2025 European Threat Landscape Report is out.

You'll notice all of the initial access methods don't involve AI, and generative AI or GenAI isn't mentioned once. Which is interesting... considering it contradicts their own narrative a few weeks ago.
November 3, 2025 at 10:34 AM
Crowdstrike cybersecurity report highlights a spike in physical attacks on privileged users #cybersecurity #infosec
Crowdstrike cybersecurity report highlights a spike in physical attacks on privileged users
While tracking cyberattacks since last year, a Crowdstrike report also found that physical attacks and kidnappings have increased dramatically, particularly in Europe. “In January 2025, threat actors kidnapped and attempted to extort the co-founder of Ledger, a prolific cryptocurrency wallet vendor, in France,” the Crowdstrike report said. “Although the threat actors in this case and numerous others have been arrested, the threat persists. Between January 2025 and September 2025, 17 similar incidents occurred in Europe, 13 of which occurred in France.” Cybersecurity consultants said that they have been hearing similar reports of increased violence to gain system access for quite some time. “I am seeing both an increase in the use of cyberattacks as a distraction for real world thefts and attacks, and the combined use of cyber and physical means to achieve criminal objectives. It is giving a new meaning to ‘brute force’ attacks,” said cybersecurity consultant Brian Levine, a former federal prosecutor who today serves as executive director of FormerGov, a directory of former government and military specialists. “As a result, both organizations and individuals are already deepening their focus on physical security and executive security. Playbooks for cyber should explicitly encourage the team to consider whether the incident they are addressing may be, in whole or in part, a distraction for some other type of attack.” Art Cooper, the principal security consultant at TrustedSec, said his key, albeit flippant, recommendation for executives who could be physically threatened by criminals trying to gain data access is, “Get a shotgun.” Cooper said that part of the problem is the typically loose way in which many European and American enterprises handle physical security, compared with, for example, enterprises in India.  He said Indian enterprises typically have multi-layered physical security around key buildings, with different security firms handling different layers. When someone enters, he said, they are typically asked to submit all electronic devices for inspection, where guards record all serial numbers. As the visitor moves deeper into the building, other security teams, working for other security companies, inspect those devices and capture the serial numbers again. However, he has started seeing enterprises in China and Japan embracing the lax methods practiced by Americans. “Asian society is starting to be just as bad as Western,” Cooper said. Noted Flavio Villanustre, SVP and CISO for LexisNexis Risk Solutions: “Physical violence as a service, such as kidnapping, is taking things to a different level, where criminals don’t seem to care much about losing the veil of anonymity protection that the internet gives them.” Key targets The Crowdstrike report detailed some of the global patterns for attack prevalence.  “Entities in Europe are more than twice as likely to be targeted than entities in the Asia Pacific and Japan region,” the report said, adding that the European Union’s GDPR is one of the reasons. “Threat actors have leveraged GDPR data breach penalties to pressure victims into paying ransoms. Several threat actors have threatened to report entities for regulatory noncompliance via their data leak sites, in ransom notes, or during negotiations.” The report highlighted various statistical attack patterns, including the most targeted verticals (manufacturing, professional services, technology, industrials and engineering, and retail) and the most popular attack methods, including, it said, “Dumping credentials from backup and restore configuration databases, which often store credentials used to access hypervisor infrastructure; remotely encrypting files, executing ransomware, often from an unmanaged system, and running the file encryption process outside of the targeted system; leveraging access to unmanaged systems to steal data and deploy ransomware; and deploying Linux ransomware on VMware ESXi infrastructure.” Another increasingly popular attack vector, the report said, is creating fake CAPTCHA lures to deliver malware. “This social engineering technique involves using pages that imitate CAPTCHA authentication tests to convince victims to copy, paste, and execute malicious code into the Windows Run dialog box or terminal. Identified campaigns used phishing emails, malicious advertising (malvertising), and search engine optimization (SEO) poisoning to direct targets to fake CAPTCHA pages.” Some criminal services have aggressively pushed specific capabilities as their own specialties, the report noted: “Advertised features included dynamically created code obfuscation, security bypass capabilities and decoy functionalities [such as] imitating cryptocurrency management platforms.” Not surprisingly, the report found that the tradition of Russian attack groups avoiding victimizing Russian businesses and consumers is still very much in evidence. “The prohibition on targeting organizations and citizens of Russia and Commonwealth of Independent States (CIS) countries has long been a tacit and often codified rule in the Russian-language underground ecosystem,” the report said. “Though this prohibition is likely rooted in an attempt to avoid domestic law enforcement, patriotism also likely plays a role, with CIS-based eCrime threat actors preferring to target external entities.”
www.csoonline.com
November 6, 2025 at 3:44 AM
So oft wie etwa ein Gigant wie Microsoft mit einem Hotfix vieles kaputt macht. Oder Crowdstrike, was ja auch was super kleines war – eigentlich. 🫣😂
November 3, 2025 at 10:27 PM
Wanting something to happen with "bad" AI to justify the ridiculous spend on "good" AI so you get to keep your CEO job.

How's the Delta Vs Crowdstrike/Crowdstrike Vs. Delta lawsuits going in Georgia? Yah. I thought so.
November 3, 2025 at 1:28 PM
This article investigates how the July 2024 CrowdStrike crash exposed the fragility of automated AI‑driven security systems and their global fallout. #cybersecurity
The $10 Billion Logic Error: What Happens When Security Moves Faster Than Sanity
hackernoon.com
November 2, 2025 at 4:40 PM
Thank you @cybersecuritydive.bsky.social for honoring the #AspenCyber Summit as a top cybersecurity conference for 2026. And good news! You can still register for THIS year's event. Go to www.aspencybersummit.org and check out Cybersecurity Dive's list at www.cybersecuritydive.com/news/top-cyb...
October 29, 2025 at 5:53 PM
Some of my NASCAR&IMSA pieces from left to right is (Carson Hocevar’s front bumper from the 2025 Coke Zero 400, Signed Carson Hocevar quarter panel from Texas 2023, Ryan preece Mohawk bumper from mid to late 2024, And a rear wing piece from the crowdstrike car in the 2025 Daytona 24h Colton herta
October 28, 2025 at 5:39 PM
'Computer sagt Nein' #FotoVorschlag

Das war der Crowdstrike Computerausfall am 19. Juli 2024. Alles stand still. Und wir waren einen Tag vorher in London eingetroffen.

October 27, 2025 at 9:15 AM
October 24, 2025 at 12:27 PM
Last year, it was CrowdStrike. This week, AWS. We are engineering critical social systems that are completely contingent on single points of failure. It’s designed fragility and it produces catastrophic risk—all because it’s marginally more efficient. We are foolishly careening toward disaster:
The CrowdStrike Debacle is a Warning
We have engineered social systems that are hyper-optimized, super efficient, but incredibly fragile. It's a mistake—and unless we fix it, we will careen toward much worse, utterly avoidable disasters.
www.forkingpaths.co
October 22, 2025 at 10:52 AM
For context, crowdstrike estimates that the entire global revenue of ransomware outfits in the whole of 2024 was $800m. Cybercrime is so incredibly destructive.
'The cyber attack on Jaguar Land Rover (JLR) will cost an estimated £1.9bn and be the most economically damaging cyber event in UK history, according to researchers.' www.bbc.co.uk/news/article...
JLR hack 'is costliest cyber attack in UK history', experts say
The cyber attack on Jaguar Land Rover is estimated to cost £2.1bn, the Cyber Monitoring Centre says.
www.bbc.co.uk
October 22, 2025 at 8:44 AM
Considered the worst outage since last year’s CrowdStrike chaos, Amazon’s DNS issues led to some popular apps going dark, flights being delayed, and banks and financial services going offline temporarily.
Amazon’s DNS problem knocked out half the web, likely costing billions
Amazon’s outage is over. But backlash over billions in losses has just started.
arstechnica.com
October 21, 2025 at 8:16 PM
Cloud infrastructure must be nationalized or at least broken up. They have such a big strangle hold on modern life - look what happened when Crowdstrike took down Azure.

The scenario you are describing is happening already - www.reuters.com/investigatio...
www.reuters.com
October 23, 2025 at 8:39 AM
CrowdStrike’s AI ransomware marketing is total bullshit.

I’ve yet to see a single incident with AI ransomware, and almost every ransomware incident initial access doesn’t use phishing, let alone ‘AI phishing’. This is wildly irresponsible marketing by CrowdStrike leading to confused CISOs.
As ransomware attacks accelerate in speed and sophistication, 38% of security leaders rank AI-enabled ransomware as their top concern — the most frequently cited worry about AI-related security issues according to CSO’s new 2025 Security Priorities study. www.csoonline.com/article/4075...
AI-enabled ransomware attacks: CISO’s top security concern — with good reason
New surveys from CSO and CrowdStrike reveal growing fears that generative AI is accelerating ransomware attacks while defenders rush to harness the same technology to fight back.
www.csoonline.com
October 21, 2025 at 5:02 PM
So last year for Halloween I was the Crowdstrike Employee that raw dogged an update in production that caused the outage last year. I guess this year I'm buying a fucking AWS shirt.
October 20, 2025 at 5:14 PM
this article is from 3 days ago lol and also lmao kiss my ass jeff bezos. honestly we're gonna find out that the crowdstrike outage and all the windows 11 bugs that keep happening are because of low quality vibe coding and """engineers""" that don't understand the product they're working on at all
October 20, 2025 at 9:14 PM
Just like the Crowdstrike incident last year, planes were grounded and people’s direct deposit was delayed (including me) - it doesn’t make sense so many companies rely on the same couple of entities to function. Like why isn’t shit more diverse???
amazon shouldn't be able to knock all this shit offline.
October 20, 2025 at 5:08 PM
Does everyone like the changes I made on my first day at AWS?

Took me awhile to find a new job after leaving Crowdstrike.
October 20, 2025 at 5:47 PM
We did that by simply not keeping crowdstrike up to date lol
October 20, 2025 at 9:38 AM
As for the other two, well, George Kurtz has hired Louis Deletraz and Malthe Jakobsen so if Crowdstrike by APR don't win he needs to take a long look in the mirror. Kessel could easily double up in GT3, but the Antares Au/Loek Hartog/Klaus Bachler Manthey squad looks good too.
October 20, 2025 at 12:25 PM
I feel like I'm shooting at fish in a barrel... but here are real examples:
- ChatGPT encouraging a kid to take their life.
- The Crowdstrike incident of July 2024, which among other things, paralyzed entire hospitals.
- The LogoFAIL vulnerability of 2023.
- Spectre and Meltdown.
October 19, 2025 at 5:45 PM
今日のハンドキャリー

CROWDSTRIKE
IX3110(2台目)
October 17, 2025 at 1:35 AM
Nobody learned a thing from the CrowdStrike fiasco, did they?
October 13, 2025 at 12:22 PM