Not a hack. Not a DDoS. Just a date. This page ships the exact operator artifacts from the episode: a one-page battle card and a PowerShell starter pack to inventory endpoints and flag risky expiry windows.
A certificate hit its NotAfter timestamp. That sounds small, but it can cascade: VPN drops, APIs return 503s, and browsers show “Not Secure” because trust collapses at the handshake.
These are the same artifacts referenced in the episode — designed to be copied into a real environment.
If you’re in the middle of it right now, don’t freestyle. Do the boring, reliable steps.
Primary sources used in this episode. Confirmed vs inferred is kept explicit throughout — that’s the Disaster Dissected standard.
Credibility > vibes. Rule: no speculation presented as fact. Confirmed vs likely vs unknown stays explicit.
Disaster Dissected is video-first: concise breakdowns of modern IT failures, with receipts and practical lessons.
Incidents are inevitable. Repeating the same ones is optional. The goal is to make postmortem thinking accessible — without dumbing it down.
Tips, corrections, sponsorship inquiries, or “please dissect this incident” — send it over.
If you have links/sources, include them. “Receipts” speed everything up.