eath," said Vadim Plesskiy.
According to Kai Mikhailov, head of the information security department at JSC Infozashchita (iTPROTECT), the popularity of the Windows OS, which is used in terminals and personal computers around the world, also played a significant role in the scale of the failure.
Deputy Director for saudi arabia whatsapp resource Product Development of Solar Security LLC (Solar Group) Artem Izbaenkov noted that the reasons for the error will require a serious investigation. In his opinion, the human factor and the possibility of problems in QA testing of the update cannot be ruled out. Malicious intent on the part of third parties (for example, an insider hacker or a complex cyberattack on service providers) should not be discounted either.
"In the modern world, the dependence on cloud services and platforms such as Microsoft Azure, through which the update was distributed across the planet, is great. Complex attacks on such services can cause a chain reaction of failures. This could be a deliberate attack on the infrastructure or exploitation of vulnerabilities in the software of partners and suppliers," noted Artem Izbaenkov.
According to Roman Prosvetov, head of the infrastructure pentest department at AT Group LLC (Angara Security pentest), such failures are not uncommon, since any OS and software updates contain changes that can cause failures in operation.
"Updates are important and they need to be installed. But installing them immediately after release and without testing them on user workstations is far from the best idea," Roman Prosvetov noted.
According to Sergey Lipov, Director of Information Technology at EdgeCenter LLC, problems related to software incompatibility, code errors, or unaccounted-for usage scenarios are identified during testing. And then it may turn out that the program does not work properly on a certain hardware configuration or in combination with other software.
"It is important to have processes in place to quickly detect and fix such issues before releasing a product to market. This may include thorough testing on multiple platforms, engaging beta testers, and using automated tools to check code," said Sergey Lipov.
According to Roman Prosvetov, before deploying an update, it is necessary to test it on systems and hardware that are as close as possible to those on which it will be used.
Kai Mikhailov agrees with Sergey Lipov. According to him, compatibility issues are common, since developers of a particular product do not have the ability to independently check all possible configurations and options for using the software.
"The most complex compatibility issues are found in closed industrial networks, as they use specific protocols and often outdated application software," noted Kai Mikhailov.