Cybersecurity firm Crowdstrike pushed an update that caused millions of Windows computers to enter recovery mode, triggering the blue screen of death. Learn …

  • Toribor@corndog.social
    link
    fedilink
    English
    arrow-up
    69
    arrow-down
    1
    ·
    4 months ago

    Many compliance frameworks require security utilities to receive automatic updates. It’s pretty essential for effective endpoint protection considering how fast new threats spread.

    The problem is not the automated update, it’s why it wasn’t caught in testing and how the update managed to break the entire OS.

    • Joe@discuss.tchncs.de
      link
      fedilink
      English
      arrow-up
      8
      arrow-down
      1
      ·
      edit-2
      4 months ago

      It is pretty easy to imagine separate streams of updates that affect each other negatively.

      CrowdStrike does its own 0-day updates, Microsoft does its own 0-day updates. There is probably limited if any testing at that critical intersection.

      If Microsoft 100% controlled the release stream, otoh, there’d be a much better chance to have caught it. The responsibility would probably lie with MS in such a case.

      (edit: not saying that this is what happened, hence the conditionals)

      • Toribor@corndog.social
        link
        fedilink
        English
        arrow-up
        13
        ·
        4 months ago

        I don’t think that is what happened here in this situation though, I think the issue was caused exclusively by a Crowdstrike update but I haven’t read anything official that really breaks this down.

        • barsquid@lemmy.world
          link
          fedilink
          English
          arrow-up
          15
          ·
          4 months ago

          Some comments yesterday were claiming the offending file was several kb of just 0s. All signs are pointing to a massive fuckup from an individual company.

          • Wiz@midwest.social
            link
            fedilink
            English
            arrow-up
            5
            arrow-down
            1
            ·
            4 months ago

            Which makes me wonder, did the company even test it at all on their own machines first?

    • LainTrain@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      8
      arrow-down
      26
      ·
      4 months ago

      Nah EDR is pointless like all of cybersecurity. All these compliance frameworks are just a further grift to get a slice of B2B procurement budgets. The practice of cybersecurity has caused a more severe widespread outage than any malware ever could.

        • fishpen0@lemmy.world
          link
          fedilink
          English
          arrow-up
          2
          arrow-down
          4
          ·
          4 months ago

          OP is not entirely wrong. At least in Linux land you can now implement EDR like functionality entirely with EBPF without installing a fucking rootkit. So traditional EDR products are a grift if you are on the bleeding edge.

      • jumjummy@lemmy.world
        link
        fedilink
        English
        arrow-up
        8
        arrow-down
        3
        ·
        edit-2
        4 months ago

        Ok Russian comrade. Security in companies is terrible. You’re right. It’s just a giant grift.

        Now, go buy some limited time offer fight fight fight shoes from agent orange.

        • LainTrain@lemmy.dbzer0.com
          link
          fedilink
          English
          arrow-up
          1
          arrow-down
          1
          ·
          edit-2
          3 months ago

          Genuinely, what? What is “fight fight fight shoes” and “agent orange” like the chemical? What does me being Russian have to do with it? Is this some kind of twitter lingo I’ve touched grass too much to understand?

          EDIT: Figured out it’s probably a trump reference. Idk I’m not a trump fan so idunno.