Threat actors are exploiting the massive business disruption from CrowdStrike’s glitchy update to target companies with data wipers and remote access tools. As businesses are looking for assistance to fix affected Windows hosts, researchers and government agencies have spotted an increase in phishing emails trying to take advantage of the situation. CrowdStrike recently released a statement that “they are actively assisting customers” impacted by the recent content update that crashed millions of Windows hosts worldwide. The company also advised customers to verify that they communicate with legitimate representatives through official channels since “adversaries and bad actors will try to exploit events like this.” For more information, please visit Fake CrowdStrike Fix.