Crowdstrike's malware-as-a-service is now affecting Linux. Red Hat, Rocky and Debian stable are affected. According to distrowatch.com, most of us here running linux as a desktop are using debian and debian stable based distros like Mint, Ubuntu, MX. Stop updating, 2 wks+
(www.theregister.com)
🚔 Crime & Democrats 💸
You're viewing a single comment thread. View all comments, or full comment thread.
Comments (25)
sorted by:
It’s really not. I manage tens of thousands of these as server capacity and can tell you we get very bad exploits on a semi annual basis. The kind where we have to batten down the hatches and everyone scrambles.
I would not use it as a desktop gui workstation simply because of how much pain there would be. I need to be productive because time is important and not waste time on tinkering. That said , the false premise that it is more secure is simply because nobody (relatively) uses it as a workstation. Windows exploits are more visible because it’s easier to attack from users clicking on stupid shit. Whereas a server is less likely to click on random things on the internet. That really is what it boils down to. Linux gets very bad exploits that were pushed out by bad actors foreign agents who actually are part of the dev team for its software. Check out this one https://www.wired.com/story/jia-tan-xz-backdoor/
The CrowdStrike situation isn’t applicable to users clicking on stupid shit. Tbh it is an anomaly and imo was not an accident. But basic end users like yourselves have no need to worry about the CrowdStrike issue it isn’t on your simpleton gaming laptop it is solely affecting (and imo) targeting critical infra systems.