Apple
Apple releasedmacOS Sequoiaon Monday , but the update has broken the functionality for some networking and security department tools from companies such as Microsoft , CrowdStrike , SentinelOne , and more , asBleeping Computer reports . Affected users onReddit are apportion their issueswith security software such as ESET Endpoint Security and CrodStrike Falcon .
Other describe issues include firewalls stimulate packet corruptions , web browser app SSL failure , and the inability to employ the “ curl ” or “ get ” commands . Users can fix the job quickly by turn off the tools , which suggest an incompatibility issue with the web mass , but this is not the locating many may be look for .
Apple
Bleeping Computer saw a non - public bulletin whereCrowdStrikeencouraged substance abuser not to kick upstairs to macOS 15 by state , “ Due to changes to interior networking structures on macOS 15 Sequoia , customer should not kick upstairs until a Mac sensor is released that amply abide macOS 15 Sequoia , ” reads the client - only CrowdStrike bulletin . ” SentinelOne Support gave their substance abuser the same advice .
ESET has release an alarum to affected users with suggestions on how to fix the issues . It tells them to go toSystem preferences > mesh > filter > Remove ESET connection . ESET also clarified that this only works with Endpoint Security 8.1.6.0 or newer and ESET Cyber Security 7.5.74.0 or newer . Any older version are uncongenial .
VPNsare no unknown to the outcome since users have also account problems with Mullvad VPN and corporate VPN . ButProton VPNhas wangle to channelize clear of the issue and is function swimmingly on the latest macOS 15 waiver . Apple has not formally commented on the cause of the problem , but according to a macOS 15 loss note seen by Bleeping Computer , an out-of-date feature in macOS 15 ’s Firewall may be to find fault .
This is not the first time Apple has issue a new operating system that has caused problem since the same thing happen with the release of macOS Ventura , which make standardized problem as long - time iOS and Mac security measure expert Patrick Wardle expressed on hisLinkedIn page .
“ Déjà vu ? ! Did Apple * again * give up a young atomic number 76 that * again * discontinue 3rd - party security tools ? ” he added in a posted on his LinkedIn in reference to a bug two year ago in macOS Ventura that caused alike problems . “ Root cause appears to either be macOS firewall itself , or the lower - level networking extension subsystem that is “ corrupting packets ” or other “ unplanned change ” to connection structures . ”
If you bet on these creature , you might have to wait some time before upgrading . But hopefully , Apple will release an update to set up the issue so that Mac users can have fun with the later updates and not worry about compatibility .