On Tuesday, Apple fixed a critical zero-day vulnerability affecting nearly all supported iPhones and iPads. The company noted that it could have been exploited in a extremely sophisticated attack against targeted individuals using older iOS versions.
The vulnerability, identified as CVE-2025-24201, allows attackers to break out of the Web Content sandbox and Cupertino warns that it “may have been exploited in an extremely sophisticated attack against specific targeted individuals on versions of iOS before iOS 17.2.”
By infosecbulletin
/ Sunday , July 20 2025
Hewlett-Packard Enterprise (HPE) warns that Aruba Instant On Access Points have hardcoded credentials, enabling attackers to skip normal authentication and...
Read More
By infosecbulletin
/ Sunday , July 20 2025
The Akira ransomware group increased its attacks, adding 12 new victims to its dark web portal from July 15 to...
Read More
By infosecbulletin
/ Saturday , July 19 2025
Defence Minister Chan Chun Sing said these select units will work with the Cyber Security Agency (CSA) in a united...
Read More
By infosecbulletin
/ Saturday , July 19 2025
Google is suing 25 unidentified cybercriminals thought to be from China for running BADBOX 2.0, a major global botnet with...
Read More
By infosecbulletin
/ Saturday , July 19 2025
Oracle's July 2025 Critical Patch Update includes 309 new security patches, with 127 addressing remotely exploitable vulnerabilities. SecurityWeek found about...
Read More
By infosecbulletin
/ Saturday , July 19 2025
Cybersecurity researchers have revealed a new malware named MDifyLoader, linked to cyber attacks using security vulnerabilities in Ivanti Connect Secure...
Read More
By infosecbulletin
/ Saturday , July 19 2025
U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a crucial vulnerability in Fortinet FortiWeb in its Known Exploited Vulnerabilities...
Read More
By infosecbulletin
/ Saturday , July 19 2025
Security researcher Jeremiah Fowler discovered an online database exposing sensitive information from an adoption agency. Jeremiah Fowler Jeremiah specializes in...
Read More
By infosecbulletin
/ Friday , July 18 2025
A critical vulnerability in Cisco Identity Services Engine (ISE) and Cisco ISE-PIC, identified as CVE-2025-20337, has a CVSS score of...
Read More
By infosecbulletin
/ Thursday , July 17 2025
On Tuesday, Bangladesh Bank organized a special award ceremony at its headquarters in Dhaka to formally recognize and honor a...
Read More
“This is a supplementary fix for an attack that was blocked in iOS 17.2,” the company said in a barebones bulletin.
“For our customers’ protection, Apple doesn’t disclose, discuss, or confirm security issues until an investigation has occurred and patches or releases are available,” the company added.
Apple identified the bug as an out-of-bounds write issue and fixed it by enhancing checks to prevent unauthorized actions.
iOS 18.3.2 was released a month after Apple fixed a security issue that let attackers with physical access disable USB Restricted Mode on locked iPhones and iPads.
The company stated that the bug enabled a highly advanced attack on specific individuals. Bill Marczak from The Citizen Lab at the University of Toronto discovered the exploit, indicating it was used for nation-state surveillance.
USB Restricted Mode is a security feature that prevents data access through the Lightning/USB-C port on an iPhone or iPad after the device has been locked for over an hour. It aims to protect against hacking tools that use USB to attempt to break the device’s passcode or extract data.
Microsoft’s March 2025 updates fix 7 zero-day, 57 flaws