The CrowStrike cyber event affected 8.5 million Windows machines and was the biggest IT outage in history. It has “beaten” even the cyber attacks of WannaCry and NotPetya.
https://www.bbc.com/news/articles/cpe3zgznwjno
Can/will this method be used by hackers? What would they need to do to take advantage of that vulnerability?
You must log in or # to comment.