Dernières nouvelles

Restez au courant de tout ce qui se passe à Approach

Blog article

Digest hebdomadaire Semaine 50 – 2023

Date de publication

21.12.2023

image

Featured Story

Bluetooth Critical Vulnerability Affects macOS, iOS, Android, and Linux

Bluetooth Vulnerability

A critical Bluetooth vulnerability, CVE-2023-45866, affects major operating systems, including macOS, iOS, Android, and Linux. Attackers can perform keystroke injection and bypass authentication. On Apple systems, even Lockdown Mode does not prevent exploitation when using Magic Keyboards over Bluetooth. Android (versions 11–14) and Linux (BlueZ stack) are also vulnerable.

Analysis from our SOC team:
Android: Turn off Bluetooth when not in use until patches are available.
Linux: Ensure your Bluetooth stack isn’t discoverable/connectable unless necessary.
Apple: Update affected devices and avoid pairing Magic Keyboards over Bluetooth if unpatched.

Other Stories

Microsoft’s Final 2023 Patch Tuesday Fixes 33 Flaws, 4 Critical

Microsoft closed the year with a relatively light Patch Tuesday, fixing 33 vulnerabilities, including four critical ones. Several of these flaws are being actively exploited in the wild, emphasizing the need for immediate patching.

Analysis from our SOC team:
Critical vulnerabilities remain common across Windows endpoints. Ensure timely deployment of OS updates across all assets to avoid exposure.

Critical WordPress Plug-in RCE Bug Exposes Sites to Takeover

The Backup Migration WordPress plugin (CVE-2023-6553) has a critical RCE vulnerability affecting over 90,000 installations. Attackers can inject arbitrary PHP and fully compromise the site.

Analysis from our SOC team:
Regularly update plugins and themes to avoid website compromise. Attackers actively scan for outdated WordPress components.

APT29 Targets JetBrains TeamCity Servers in Ongoing Attacks

Russian state-backed APT29 (SVR) is actively exploiting CVE-2023-42793 to compromise TeamCity CI/CD environments. The vulnerability enables full RCE and puts code, secrets, and deployment systems at risk.

Analysis from our SOC team:
This 4-month-old vulnerability is now actively exploited by state-backed actors. If unpatched, prioritize immediate remediation and conduct a retrospective threat hunt.

Want to enhance your organization’s cyber awareness or compliance strategy? Contact the Approach Cyber SOC team for tailored support and training programs.

AUTRES HISTOIRES

Contactez-nous pour en savoir plus sur nos services et solutions

Notre équipe vous aidera à entamer votre voyage vers la cyber-sérénité

Préférez-vous nous envoyer un courriel ?