CrowdStrike debacle provides road map of American vulnerabilities to adversaries
Submitted 8 months ago by bot@lemmy.smeargle.fans [bot] to hackernews@lemmy.smeargle.fans
https://www.nytimes.com/2024/07/19/us/politics/crowdstrike-outage.html
autotldr@lemmings.world [bot] 8 months ago
This is the best summary I could come up with:
In the worst-case scenarios that the Biden administration has quietly simulated over the past year or so, Russian hackers working on behalf of Vladimir V. Putin bring down hospital systems across the United States.
For two years now, the White House, the Pentagon and the nation’s cyberdefenders have been trying to come to terms with Volt Typhoon, a particularly elusive form of malware that China has put into American critical infrastructure.
Yet as the “blue screen of death” popped up from the operating rooms of Massachusetts General Hospital to the airline management systems that keep planes flying, America got another reminder of the halting progress of cyberresilience.
Just three months ago, it released a blistering account of how Microsoft allowed intrusions into its cloud services that permitted Chinese spies to clean out State Department files about Beijing and Commerce Secretary Gina Raimondo’s emails.
In the run-up to the 2020 presidential campaign, Moscow’s most skilled intelligence service bored into a component of that supply chain, worming its way into the update systems of software made by Solar Winds.
“In a globally interconnected economy, we need to ensure that we have the resilience” when an event like this happens, said Anne Neuberger, the deputy national security adviser for cyber and emerging technologies, a job that did not exist until the Biden administration invented it.
The original article contains 998 words, the summary contains 222 words. Saved 78%. I’m a bot and I’m open source!