Anything can be hacked, especially if you purposely install software/ malware on your machine that operates as a kernel level driver which is what crowdstrike requires to function properly.
If I install a secure version of linux on my machine and proceed to add to it a program running at kernel level 0 which bypasses all that security, then I have opened up the entire OS to a security risk.
If I install at user level 1 software that opens up security, I'm also making the OS be at risk, but not to the same extent, as the kernel should be somewhat protected unless a bad operator takes advantage of my security hole in software level 1 and finds a way to elevate the security level to level 0 (ie exploits a known bug or a zero-day). If the privilege is hacked /elevated to kernel level 0, then nothing is secure on that OS because the user has taken actions that exposed the system and a bad actor has taken advantage and gained control.
No OS is impervious to security issues, when users or administrators make decisions to add software like Crowdstrike, the actual security of the system becomes the lowest common denominator of either the OS security or the installed software's security. Any security hole in either package generates the same risk of a security breach.
Anything can be hacked, especially if you purposely install software/ malware on your machine that operates as a kernel level driver which is what crowdstrike requires to function properly.
If I install a secure version of linux on my machine and proceed to add to it a program running at kernel level 0 which bypasses all that security, then I have opened up the entire OS to a security risk.
If I install at user level 1 software that opens up security, I'm also making the OS be at risk, but not to the same extent, as the kernel should be somewhat protected unless a bad operator takes advantage of my security hole in software level 1 and finds a way to elevate the security level to level 0 (ie exploits a known bug or a zero-day). If the privilege is hacked /elevated to kernel level 0, then nothing is secure on that OS because the user has taken actions that exposed the system and a bad actor has taken advantage and gained control.
No OS is impervious to security issues, when users our administrators make decisions to add software like Crowdstrike, the actual security of the system becomes the lowest common denominator of either the OS security or the installed software's security. Any security hole in either package generates the same risk of a security breach.