Crowdstrike's malware-as-a-service is now affecting Linux. Red Hat, Rocky and Debian stable are affected. According to distrowatch.com, most of us here running linux as a desktop are using debian and debian stable based distros like Mint, Ubuntu, MX. Stop updating, 2 wks+
(www.theregister.com)
🚔 Crime & Democrats 💸
You're viewing a single comment thread. View all comments, or full comment thread.
Comments (25)
sorted by:
Exactly. Which is a good example of why decentralized systems are superior to excessively centralized alternatives.
In the companies where I worked, no patch or update was EVER made directly to production environments... especially for Windows and Linux OS (many companies run mixed environments).
All patches and updates were downloaded to safe environments, thoroughly tested and proven to be safe BEFORE ever pushing them to production environments - which in corporate networks also included user desktops/laptops, etc.
Crowdstrike Falcon pushed updates directly from the cloud to local computers - which is bat shit crazy from a security/reliability perspective. Will people learn from this? That remains to be seen...
I wonder if Crowdstrike hiring policies, and the people they have attracted to their company due to such policies, had anything to do with it:
"CrowdStrike is an advocate for diversity and equal employment opportunities. To enhance our culture as we grow, we offer unconscious bias training for recruiters and hiring managers with the goal of helping our people be more inclusive managers, run inclusive meetings and be thoughtful of inclusivity in everyday process and practice."
https://www.crowdstrike.com/about/environmental-social-governance/diversity-equity-inclusion/