CrowdStrike unhappy with “shady commentary” from competitors after outage - eviltoast

Botched update leads to claims that competitors are “ambulance chasing.”

  • Kyrgizion@lemmy.world
    link
    fedilink
    English
    arrow-up
    32
    ·
    3 months ago

    I honestly don’t understand they’re still in business. First of all I’d think the claims by impacted customers would be fairly astronomical, and second, any IT director worth his or her salt will never, ever touch anything from this company again with a 10-foot pole.

    • The Quuuuuill@slrpnk.net
      link
      fedilink
      English
      arrow-up
      22
      ·
      3 months ago

      They do long term contracts. They’re not gonna see many renewals but before then they’re likely to continually see cash influx from monthly current subscribers. But I view them as a dead company walking, like LastPass

      • huginn@feddit.it
        link
        fedilink
        English
        arrow-up
        5
        ·
        3 months ago

        Who else do you go to though? Ring 0 fed ramp security vendors are not exactly common.

        They’ll keep a lot of business just from lock in

        • The Quuuuuill@slrpnk.net
          link
          fedilink
          English
          arrow-up
          4
          ·
          3 months ago

          There’s gonna be at least a few companies who correctly assess that there aren’t many because it wasn’t a good idea giving third party access to corporations to Ring 0

  • ApeNo1@lemm.ee
    link
    fedilink
    English
    arrow-up
    4
    ·
    3 months ago

    I would be less worried about being on the receiving end of a Nelson “Ha Ha” from the entire IT world, and more worried that Microsoft will ban the side load pattern into the kernel area CrowdStrike depends on for updating their software but also the potential of a major exploit through their software. They have essentially recreated a similar pattern that had Microsoft introduce DEP but for the Kernel. There would be individuals and groups now trying to work out how to exploit knowing there are at least 8 million machines vulnerable and access to the kernel became slightly easier. Hopefully they at least have some cryptographic protection on code that is side loaded so someone can’t just dump a file in the right location.

  • Skates@feddit.nl
    link
    fedilink
    English
    arrow-up
    3
    ·
    3 months ago

    That’s fucking rich, let me tell you. Because I’m an unwilling crowdstrike user who just today had another issue - we received a company-wide email that our PCs will be slowed down because crowdstrike is experiencing another botched update that makes it take up too much memory/CPU to do it’s shady fucking background work.

    I’m getting 5 second delays trying to snap a screenshot and they have the gall to complain about commentary. Here’s some fucking commentary for you: I’ve hired interns who were more principled than your entire company when it comes to pushing to production. Wanna try doing the same for like, 30 consecutive days? Or are you branching out into selling “it has been X days since the last global incident” t-shirts? Cause at least that’d be one useful product climbing out of that shithole of a company.