Published in News

Apple’s new update breaks security tools

by on20 September 2024


It is not as if users ever turn their machines on

Fruity cargo cult Apple has shipped its latest macOS 15, or Sequoia, with a super cool, much-sought-after feature that borks security tools.  

It would appear that only the fruity gods at Apple could have made an update which manages to fry tools made by CrowdStrike, SentinelOne, and Vole and let it out of the flying saucer for the great unwashed to install.

It’s unclear exactly what the issue is, but it appears to affect several products made by companies that provide software for macOS users and enterprises.

Developers are furious because their users are blaming them for borking their Macs when it is Apple’s fault – it is just that the Tame Apple Press is not telling any one that.

One developer said that the world would be a better place if Apple had spent more time doing a Q&A and less time marketing and overhyping their products.

On the day of macOS Sequoia’s release, a CrowdStrike sales engineer said in a Slack room for Mac admins that the company had to delay support for the new version of Mac’s operating system.

It is not as if Apple was not warned that there were issues. Security developers told Apple their products could not support Sequoia until Apple pulled its socks up. While sharper minds at Apple [does Apple have sharper minds? Ed] might have delayed the release.

CrowdStrike sent out a “Tech Alert” to customers, adding that “there’s quite a lot going on with the changes in the network stack.”

”We’re also tracking similar issues with other vendors and have feedback and a case into Apple. While we would love for a fast-follow patch that resolves this for us, we’re acting under the assumption there won’t be, and we’ll need to fix it in our code with a sensor release,” the sales engineer wrote.

“Please trust me when I say this was looked at through every angle to see if there was any way to continue to provide the best protection to our customers on this new OS without delay,” the CrowdStrike engineer wrote. “Ultimately, it was decided that the best course to protect our Mac fleets is to wait until this is resolved.”

Last modified on 20 September 2024
Rate this item
(5 votes)