978-223-2959 horizon@saviorlabs.com

Stop – Critical iPhone and iPad Updates

Not to alarm you, but you need to stop whatever you are doing and update your iPhones and iPads.

This is a serious issue as it can compromise your device without you doing anything at all. Unless your device is turned off in a drawer behind a door marked beware of the leopard, it is not safe (extra points if you know what this reference is from).

For technical details, see About the security content of iOS 16.6.1 and iPadOS 16.6.1 – Apple Support and more details at Apple Patches Actively Exploited iOS, macOS Zero-Days – SecurityWeek.

Please subscribe to our private security notice feed on this page. These notices are specially designed for business users.

Please help us out by forwarding this along to anyone you care about.

Another Critical Apple Update

It seems like I keep repeating myself. It seems like I keep repeating myself. But here we go again… you need to stop whatever you are doing and update all your Apple products.

It used to be that Macs did not get viruses. Those days are gone. Sure, they are not viruses but actually much worse, errors in the operating system that allow for the complete takeover of your computer. Scary. Go forth and update young Jedi! Now, do, there is no try.

See Apple Ships Urgent iOS Patch for Newly Exploited Zero-Days – SecurityWeek

Apple Security Updates – Update Now (Again)

Here we go again!

Apple has released security updates to address vulnerabilities in multiple products. An attacker could exploit some of these vulnerabilities to take control of an affected device.

CISA encourages users and administrators to review the following advisories and apply the necessary updates.

Apple Security Updates Needed NOW!

Apple has some serious updates. So much so that you should install the update now! This is for Apple iOS 16 compatible devices, iPhone 8 and newer (as below).

The table below shows the recent updates and how they apply.

Here is a link to the release notes: https://support.apple.com/en-us/HT213407#1612.

Apple’s iOS 16.3.1 security page discloses that the update contains just two security patches – but very serious ones.

Apple security updates

Name and information link Available for Release date
macOS Big Sur 11.7.4
This update has no published CVE entries.
macOS Big Sur 15 Feb 2023
Safari 16.3 macOS Big Sur and macOS Monterey 13 Feb 2023
iOS 16.3.1 and iPadOS 16.3.1 iPhone 8 and later, iPad Pro (all models), iPad Air 3rd generation and later, iPad 5th generation and later, and iPad mini 5th generation and later 13 Feb 2023
macOS 13.2.1 macOS Ventura 13 Feb 2023
tvOS 16.3.2 (details available soon) Apple TV 4K (all models) and Apple TV HD 13 Feb 2023
watchOS 9.3.1 (details available soon) Apple Watch Series 4 and later 13 Feb 2023

For a good report, read this: Apple iOS 16.3.1 Release: Should You Upgrade? (forbes.com)

Widespread takeover of Comcast Xfinity email accounts

Last week a number of Comcast customers logged into their Xfinity email accounts only to discover that they had been hacked. The source of these widespread attacks seems to be an exploit that allows an attacker to bypass Xfinity two-factor authentication (2FA) for Xfinity accounts.

Hackers appear to be using a privately circulated tool that bypasses the one-time-passcode (OTP) used in 2FA. Essentially, your account will not send the 2FA code to you. Instead, the hackers will get it, cutting you out of the loop.

First, the attackers compromise an Xfinity email account by using stolen passwords from the Dark Web. From there, they login with the stolen passwords and use the private 2FA bypass tool to get around phone verification.

After that, the password is reset, and any backup or secondary emails are changed to one the attacker controls.

Once they have access to the Xfinity email, hackers can use this email to attempt to password reset other services with the ‘Forgot my Password’ feature.

They’ve been observed using this method to compromise Drobox, Evernote and even cryptocurrency exchange accounts such as Coinbase and Gemini.

Comcast hasn’t released an official statement as of this correspondence, and its unknown how many accounts were compromised. If you have a Comcast email account, we recommend that you immediately update your password and check the recovery email and 2FA information you have on file. Reach out to Comcast Xfinity support if necessary.

It is also a good idea to review your other accounts and services for compromise.

A few important things to note in these attacks:

  • 2FA was not enough. The hackers bypassed it.
  • Those who regained access to their accounts did so because they noticed a change in 2FA by monitoring their email accounts.
  • The accounts were originally compromised via “credential stuffing” which uses Leaked Passwords found on the Dark Web

These are all common pain points for which our 3rd party security assessments identify.


If you have any questions or concerns, please do not hesitate to contact us.