Latest Stories

Stay up-to-date with everything at Approach

Blog article

Weekly Digest Week 28 – 2023

Publication date

14.07.2023

Featured Story

Microsoft Releases Patches for 132 Vulnerabilities, Including 6 Under Active Attack

Microsoft has issued patches for 132 vulnerabilities, including six zero-days under active exploitation. Among them is CVE-2023-36884, a critical vulnerability leveraged in targeted attacks against defense and government entities using malicious Office documents. This zero-day currently has no patch.

The attacks are attributed to Russian-linked actor Storm-0978. Microsoft recommends enabling the “Block all Office applications from creating child processes” ASR rule as a temporary defense.

SOC Analysis:
The most dangerous zero-day (CVE-2023-36884) lacks a patch. We recommend testing the ASR rule in audit mode before full deployment. Apply all other updates promptly and contact our SOC for detection and response support.

Other Stories

Apple Re-Releases Rapid Security Response to Fix Zero-Day Bug

Apple reissued updates for iOS, iPadOS, and macOS to address CVE-2023-37450. The update fixes a WebKit flaw that could be exploited via malicious web content. The re-release was necessary after initial patches caused Safari browsing issues.

SOC Analysis:
Ensure devices are on:
  • macOS Ventura 13.4.1 (c)
  • iOS 16.5.1 (c)
  • iPadOS 16.5.1 (c)

Our SOC can assist with patch validation across fleets.


Fortinet: Critical RCE Vulnerability CVE-2023-33308 – Patch Immediately

CERT.be warns of CVE-2023-33308, a critical unauthenticated RCE vulnerability in FortiOS and FortiProxy. Although no public exploitation is confirmed yet, similar flaws have been rapidly abused in the past.

SOC Analysis:
Immediate patching is recommended. If patching is delayed, apply mitigation steps from Fortinet’s advisory. Our SOC can assist with vulnerability scanning and segmentation checks.

Python-Based PyLoose Fileless Malware Targets Cloud Workloads

A new fileless malware called PyLoose is abusing misconfigured Jupyter Notebook services to execute Python-based cryptocurrency mining code entirely in memory. At least 200 incidents have been observed so far.

SOC Analysis:
Limit public exposure of cloud services. Harden accessible endpoints and ensure all cloud workloads have EDR coverage and logging. Our SOC can help map attack surfaces and recommend monitoring solutions.

Beware of Fake Message Using Safeonweb Name and itsme Logo

A phishing email claiming a temporary eID block is spoofing Safeonweb and misusing the itsme logo. It links to a malicious domain. Do not click the link and report the message immediately.

SOC Analysis:
Always verify suspicious messages manually. Forward suspicious emails to:
  • verdacht@safeonweb.be
  • suspect@safeonweb.be
  • suspicious@safeonweb.be

We’re available to help investigate phishing attempts and secure affected accounts.


Want to enhance your organization’s cyber awareness or compliance strategy? Contact the Approach Cyber SOC team for tailored support and training programs.

OTHER STORIES

Contact us to learn more about our services and solutions

Our team will help you start your journey towards cyber serenity

Do you prefer to send us an email?