Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I assume Crowdstrike is software you usually want to update quickly, given it is (ironically) designed to counter threats to your system.

Very easy for us to second guess today of course. But in another scenario a manager is being torn a new one because they fell victim to a ransomware attack via a zero day systems were left vulnerable to because Crowdstrike wasn’t updated in a timely manner.



Maybe, if there's a new zero-day major exploit that is spreading like wildfire. That's not the normal case. Most successful exploits and ransom attacks are using old vulnerabilites against unpatched and unprotected systems.

Mostly, if you are reasonably timely about keeping updates applied, you're fine.


> Maybe, if there's a new zero-day major exploit that is spreading like wildfire. That's not the normal case.

Sure. And Crowstrike releasing an update that bricks machines is also not the normal case. We're debating between two edges cases here, the answers aren’t simple. A zero day spreading like wildfire is not normal but if it were to happen it could be just as, if not more, destructive than what we’re seeing with Crowdstrike.


In the context of the GP where they were actively treating a heart attack, the act of restarting the computer (let alone it never come back) in of itself seems like an issue.


I believe this update didn't restart the computer, just loaded some new data into kernel. Which didn't crash anything the previous 1000 times. A successful background update could hurt performance, but probably machines where that's considered a problem just don't run a general-purpose multitasking OS?


tfw you need to start staggering your virus updates in case your anti-virus software screws you over instead


Maybe those old boomer IT people were on to something by using different Citrix clusters and firewalling off the ones that run essential software...




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: