Microsoft reports CrowdStrike outage impacted over 8 million computers globally

July 22, 2024
1 min read


TLDR:

  • CrowdStrike’s routine update caused a major IT outage affecting 8.5 million computers worldwide.
  • Home Affairs Minister Clare O’Neil estimates it may take up to two weeks to resolve all issues.

Full Article:

Home Affairs Minister Clare O’Neil has stated that it could take up to two weeks to fully resolve the “teething issues” caused by the CrowdStrike outage. The outage, triggered by a software update from the cybersecurity firm, led to systems problems affecting various sectors including air travel, broadcasting, and essential services like healthcare and banking.

Despite the major disruption, there was no impact on critical infrastructure and emergency services remained operational. CrowdStrike and Microsoft are working on automatic fixes to speed up the recovery process. However, supermarkets are still experiencing issues, but there is no need to stockpile goods.

Australian Chamber of Commerce chief executive Andrew McKellar mentioned that businesses may not receive compensation for lost productivity, but it presents an opportunity for learning and improving national resilience. The federal government is urged to review cybersecurity systems to prevent future breakdowns.

In summary, the CrowdStrike outage is a reminder of the importance of maintaining redundancies and alternatives in case of such incidents. With over 8 million computers affected worldwide, cybersecurity remains a critical aspect of business and government operations.


Latest from Blog

Top 20 Linux Admin Tools for 2024

TLDR: Top Linux Admin Tools in 2024 Key points: Linux admin tools streamline system configurations, performance monitoring, and security management. Popular Linux admin tools include Webmin, Puppet, Zabbix, Nagios, and Ansible. Summary

Bogus job tempts aerospace, energy workers

TLDR: A North Korean cyberespionage group is posing as job recruiters to target employees in aerospace and energy sectors. Mandiant reports that the group uses fake job descriptions stored in malicious archives