Blog

Blog

By Shivam Dharpure November 15, 2024
Visionary Vigilance: Cybersecurity Weekly Digest – Episode 3
By Shivam Dharpure November 11, 2024
🔒 Visionary Vigilance: Last Week’s Cyber Insights
By Shivam Dharpure October 27, 2024
🔒 Visionary Vigilance: Key Cyber Events. This r oundup covers the most recent developments in cybercrime and defence, from scams to security advances.
Star Health Data Leak
By Shivam Dharpure October 17, 2024
Unravel the complex story behind the Star Health Insurance data breach, where a hacker named xenZen allegedly leaked sensitive customer and claims data. Dive into the timeline of events involving the CISO, insider accusations, and how disinformation played a role. This blog explores the hacker’s claims, Star Health’s response, and CloudSEK’s investigation that exposes the truth. Read on for key insights into one of India’s most intriguing cybercrime cases.
By Shivam Dharpure July 21, 2024
Recently, CrowdStrike encountered a technical issue with their Falcon platform. On July 19, 2024, at 04:09 UTC, a routine sensor configuration update for Windows systems led to unexpected system crashes and blue screens (BSOD). CrowdStrike quickly identified and resolved the problem by 05:27 UTC the same day. This incident was not related to any cyberattack. **Impact:** The issue affected customers running Falcon sensors for Windows version 7.11 and above who were online between 04:09 UTC and 05:27 UTC. These systems, having downloaded the faulty configuration update, experienced crashes. **Configuration Files:** The problem originated from the “Channel Files,” crucial components of Falcon’s behavioural protection, updated daily to address new cyber threats. This process has been part of Falcon’s design since its inception. **Technical Details:** The affected file, Channel File 291, located in: ``` C:\Windows\System32\drivers\CrowdStrike\ ``` Is responsible for evaluating named pipe execution on Windows systems. The update aimed to mitigate threats from malicious named pipes but caused a logic error leading to system crashes. **Remediation:** CrowdStrike promptly corrected the logic error in Channel File 291. Detailed remediation steps and updates are available on their blog and Support Portal. Systems not impacted by this issue continue to function normally. Linux and macOS systems were unaffected. **Solution** CrowdStrike has provided a specific remediation step: 1. Navigate to the %WINDIR%\System32\drivers\CrowdStrike directory. 2. Locate the file matching “C-+919691568071*.sys” and delete it. 3. Detach the volume from the new virtual server. 4. Reattach the fixed volume to the impacted virtual server. - Shivam Dharpure Founder & Director Visionary Bose Pvt. Ltd. #Cybersecurity #CrowdStrike #FalconUpdate #SystemCrash #TechUpdate #thevisionarybose
Share by: