David E. Sanger / New York Times: The CrowdStrike debacle may have accidentally provided cybercriminals and countries like China a more detailed road map to disrupt US critical infrastructure  —  With each cascade of digital disaster, new vulnerabilities emerge.  The latest chaos wasn’t caused by an adversary …

    • Blaster M@lemmy.world
      link
      fedilink
      English
      arrow-up
      13
      ·
      edit-2
      2 months ago

      Worse… target CrowdStrike or any other security monitoring system… which means being able to get in anything, Windows, Linux, MacOS… not that they don’t already do that. Because they definitely do.

        • Blaster M@lemmy.world
          link
          fedilink
          English
          arrow-up
          4
          ·
          edit-2
          2 months ago

          My point exactly. What good is a dozen docker containers nested in four VMs if you can slap all of it aside with the giant ROOT SHELL hand because you hacked into the remote monitoring software to take control of the system.

          The remote management system is now the weaket link in the system’s security chain.

      • Optional@lemmy.world
        link
        fedilink
        English
        arrow-up
        2
        arrow-down
        1
        ·
        2 months ago

        If it’s specifically allowed, yes. Windows is swiss cheese with tons of contaminants in.

          • Optional@lemmy.world
            link
            fedilink
            English
            arrow-up
            1
            ·
            2 months ago

            Not necessarily. Proper permissions and lack of system bugs are ok to monitor, it doesn’t mean the system is less secure.