To avoid such issues in the future, CrowdStrike should prioritize rigorous testing across all supported configurations.
Bold of them to assume there’s a future after a gazillion off incoming lawsuits.
I was listening to a podcast earlier, and they mentioned the fact that their legal liability may, in fact, be limited because of specific wording in most of their contracts.
In other words, they may actually get away with this in the short term. In the long-term, however, a lot of organizations and governments that were hit by this will be reevaluating their reliance on such monolithic tech solutions as crowdstrike, and even Microsoft.
So you may be right, but not for the reasons you think.
and even Microsoft
(x) doubt
They had decades to consider Microsoft a liability. Why start doing something about it now?
Because cybersecurity is becoming more of a priority. The US government has really put their attention on it in the last few years.
Contracts aren’t set in stone. Not only are those contracts modified before they are accepted by both parties, it’s difficult to limit liability when negligence is involved. CS is at worst going to be defending against those, at best defending against people dumping them ahead of schedule against their contracted term length.
Oh so you can fire QA department, get absolutely destructive update to millions of systems across the globe and this gross negligence doesn’t matter because of magic words in a contract? I don’t think so.
They mean after Crowdstrike gets sold, the new company promises a more rigorous QA, and quietly rebrands it.
Additionally, organizations should approach CrowdStrike updates with caution
We would if we were able to control their “deployable content”.
Serious question, can you not? There isn’t an option to…like…set a review system first?
But it sounds like this added files / drivers or something, not just antivirus rules?
I read on another thread that an admin was emulating a testing environment by blocking CrowdStrike IPs on their firewall for the whole network before each update, with the exception of a couple machines. It’s stupid that he has to do this but hey, his network was unaffected
But I’ve read so many posts on here about how Linux is flawless!
not sure if you’re being sarcastic, but if anything this news paints linux deployment in an even better light.
Are you shocked that bad software can crash multiple operating systems or something?
Nah, but there were some Linux evangelists claiming this couldn’t possibly happen to Linux and it only happened to Windows because Windows is bad. And it was your own fault for getting this BSOD if you’re still running Windows.
And sure, Windows bad and all, but this one wasn’t really Microsofts fault.
The sane ones of us know well that a faulty driver is a faulty driver, but! Linux culture is different. Which is why this happened so spectacularly with Windows. EDIT: and not with Linux
I’m not shocked at all, but there seems to be a very sizable number of people on Lemmy who think if people just used Linux there’d never be another problem or exploit again, which is ridiculous. Mac users used to feel the same way until the market share started to grow and all of the sudden you’re seeing news of serious exploits.
Haven’t you heard 4% market is captured by Linux , it’s the ONLY saviour os out there , windows users and macos users are idiots and all Lemmy Linux dudebros grandpa’s are using Linux without single problem. Despite the fact that each Linux had it’s own shell and there is no escape from terminal ( in 2024) if you even as try to use something more complicated. ;)
For almost every use case a normal user needs, there is a gui. You do not need the terminal.
Tell me where to find executables for programs installed without using Terminal , a very very clickable task in windows
Companies don’t really use Debian or Rocky in widescale production because they have no support.
Now red hat or ubuntu is a different matter.
Honestly though this does point out that this is a pattern of behavior on crowdstrikes part. This should have been the canary in the coalmine.
I don’t know about that. In the HPC space we use a lot of EL distros. Mainly Centos & now Rocky. Most of the nodes run the os in ram too. Though almost all those kind of systems have no internet connection and don’t use things like crowdstrike. I’ve worked for a few places where the only part of the company that used windows was the office staff eg accounting, hr, etc. everything else is/was using an EL distro or upstream of one eg Fedora. Those type of places usually don’t mess things like crowdstrike for a lot of different reasons eg the kind of data they’re processing and security requirements on that data.
I recently learned that this is the same company that gave us the bs Russia Gate.
So who do you think hacked the DNC and got their emails, then? Is it the same people who hacked the RNC but didn’t leak the emails? What makes you more qualified than CrowdStrike on this?
U.S. intelligence officials cannot make definitive conclusions about the hacking of the Democratic National Committee computer servers because they did not analyze those servers themselves. Instead, they relied on the forensics of CrowdStrike, a private contractor for the DNC that was not a neutral party, much as “Russian dossier” compiler Christopher Steele, also a DNC contractor, was not a neutral party. This puts two Democrat-hired contractors squarely behind underlying allegations in the affair – a key circumstance that Mueller ignores.
https://www.theguardian.com/us-news/2020/aug/18/donald-trump-us-senate-report-russia-campaign
A report by the Senate intelligence committee… runs to nearly 1,000 pages and goes further than last year’s investigation into Russian election interference by special prosecutor Robert Mueller… identifies Konstantin Kilimnik as a Russian intelligence officer employed by the GRU, the military intelligence agency behind the 2018 poisoning of the Russian double agent Sergei Skripal. It cites evidence – some of it redacted – linking Kilimnik to the GRU’s hacking and dumping of Democratic party emails.
I recently learned that this is the same company that gave us the bs Russia Gate.
WTF you mean the US Senate?
https://www.theguardian.com/us-news/2020/aug/18/donald-trump-us-senate-report-russia-campaign