Latest Stories

Stay up-to-date with everything at Approach

Blog article

Weekly Digest Week 29 – 2024

Publication date

19.07.2024

Featured Story

Bad CrowdStrike Update Linked to Major IT Outages Worldwide

Organizations worldwide are reporting major outages that appear to be caused by a bad update pushed out by cybersecurity giant CrowdStrike (NASDAQ: CRWD).

CrowdStrike launched an investigation after receiving widespread reports of Windows hosts experiencing a Blue Screen of Death (BSOD). The BSOD appears to be caused by a recent CrowdStrike Falcon sensor update, reportedly putting affected devices into inoperable BSOD loops.

SOC Analysis:
This incident reveals a significant breach of the third pillar of information security: availability. Although not a cyberattack, this disruption highlights how software failures can incapacitate essential systems. The recommended workaround: boot into Safe Mode, delete the file matching “C-00000291*.sys” under C:\Windows\System32\drivers\CrowdStrike, then reboot normally.

Other Stories

Oracle Releases Critical Patch Update Advisory for July 2024

Oracle has issued its quarterly Critical Patch Update (CPU) for July 2024, addressing vulnerabilities across a broad range of its products. Some of the flaws could allow attackers to take control of affected systems.

SOC Analysis:
Oracle’s quarterly updates are vital for securing enterprise applications. Organizations should review the CPU and apply patches promptly to reduce their exposure and meet compliance standards.

SolarWinds Patches 11 Critical Flaws in Access Rights Manager Software

SolarWinds has patched 11 security flaws in Access Rights Manager (ARM), with seven rated critical (CVSS 9.6) and four rated high severity. Exploiting these flaws could lead to information theft or remote code execution.

SOC Analysis:
SolarWinds ARM is deeply integrated into enterprise environments, making it an attractive target for attackers. Apply the patches without delay to avoid becoming a victim of lateral movement or ransomware.

WARNING: CRITICAL AUTHENTICATION BYPASS VULNERABILITY IN CISCO SMART SOFTWARE MANAGER (SSM) ON-PREM, PATCH IMMEDIATELY!

A flaw in Cisco SSM On-Prem allows attackers to reset any user’s password — including administrators — and gain full access. This flaw impacts software used by Cisco partners and service providers to manage licenses and accounts.

SOC Analysis:
This critical vulnerability allows privilege escalation to admin rights. Apply the Cisco patch immediately, and conduct a thorough audit if exploitation is suspected.

Want to enhance your organization’s cyber awareness or compliance strategy?
Contact the Approach Cyber SOC team for tailored support and training programs.

OTHER STORIES

Contact us to learn more about our services and solutions

Our team will help you start your journey towards cyber serenity

Do you prefer to send us an email?