Latest Stories

Stay up-to-date with everything at Approach

Blog article

Weekly Digest Week 41 – 2024

Publication date

11.10.2024

Featured Story

CISA Warns of Jenkins RCE Bug Exploited in Ransomware Attacks

CISA has added CVE-2024-23897 to its Known Exploited Vulnerabilities catalog. This flaw allows unauthenticated attackers to read arbitrary files from Jenkins controller file systems via the CLI parser. Multiple threat actors, including the RansomEXX gang, have exploited it in real-world attacks on service providers like BORN Group and Brontoo Technology Solutions.

SOC Analysis:
Jenkins plays a critical role in CI/CD pipelines, making this RCE flaw particularly dangerous. We strongly advise applying the patches released in Jenkins versions 2.442, LTS 2.426.3, and LTS 2.440.1. Our SOC team can assist with vulnerability management and deployment best practices.

Other Stories

Google Fixes High-Severity Chrome Flaw Actively Exploited in the Wild

Google has patched CVE-2024-7971, a type confusion bug in the V8 JavaScript engine affecting Chrome prior to version 128.0.6613.84. The flaw allowed attackers to exploit heap corruption via crafted HTML content. It is the third type confusion bug addressed by Google in 2024.

SOC Analysis:
We recommend updating Chrome and all Chromium-based browsers immediately. Patch to Chrome 128.0.6613.84/.85 on Windows/macOS or 128.0.6613.84 on Linux. Monitor enterprise browsers for lagging updates or bypassed policies.

Critical Flaw in WordPress LiteSpeed Cache Plugin Allows Hackers Admin Access

CVE-2024-28000 (CVSS 9.8) affects the popular LiteSpeed Cache plugin with over 5M installs. The unauthenticated privilege escalation flaw lets attackers gain admin rights and install malicious plugins. Patched in version 6.4.

SOC Analysis:
All WordPress sites using LiteSpeed Cache must upgrade to version 6.4 or later immediately. Failure to patch leaves sites open to full compromise. We also recommend plugin audits and limiting admin access to vetted accounts only.

WhatsApp Data Leak Hits Belgian Users – 3.2 Million Numbers for Sale

Safeonweb warns that over 3.2 million WhatsApp numbers and user IDs linked to Belgian users are circulating on dark web forums. This leak enables scams including smishing (SMS phishing) and vishing (voice phishing).

SOC Analysis:
Follow these tips to protect yourself:
  • Be cautious of unknown callers or messages
  • Enable two-factor authentication on WhatsApp
  • Never share personal details over text or phone
  • Adjust your privacy settings to reduce exposure

Our SOC team can help verify suspicious activity or messages.


Want to enhance your organization’s cyber awareness or compliance strategy?
Contact the Approach Cyber SOC team for tailored support and training programs.

OTHER STORIES

Contact us to learn more about our services and solutions

Our team will help you start your journey towards cyber serenity

Do you prefer to send us an email?