NickMack:
As you state, the foundational cause is the architectural decisions made by Microsoft around the kernel and how applications interact/control plain allowing an application to brick and O/S vs. terminate/disallow. Dont be fooled into believing this is only a MS risk/issue..... Architecture always is a trade off of many things.
There's multiple lessons here for all, from Vendors, customers, MSPs etc. - As always Security is about defense in depth, layers, acceptable risk, $$, culture, diversity of AV products etc.
Nick
Completely agree and definitely not just a MS risk/issue. As an example, Crowdstrike has caused issues previously on Linux but on a much smaller scale:
https://old.reddit.com/r/debian/comments/1c8db7l/linuximage61020_killed_all_my_debian_vms/
In the current case I've been interested by the several analyses that have shown the channel update file was full of nulls. However, Crowdstrike have stated that wasn't the issue. I'm trying to understand how a file that is referenced just containing null values couldn't be a problem.




