Tuesday, March 5, 2024

Apple Released Security Updates for iOS, watchOS, Safari , tvOS, iTunes & Fixed Several Vulnerabilities

Apple released security updates for many of its product including iOS, watchOS, Safari, tvOS, iTunes and fixed several vulnerabilities.

iOS 12.1 released and fixed around 31 vulnerabilities that belong to AppleAVD, Contacts,  FaceTime, Graphics Driver, ICU, IPSec, Kernel, Messages etc.

Natalie Silvanovich of Google Project Zero contributed more in this fixes and he reported several critical vulnerabilities in iOS that allows an attacker to execute arbitrary code on the previous version of iOS.

Apple also Fixed a pair of interesting vulnerabilities in FaceTime that were discovered and reported by Natalie Silvanovich of Google Project Zero. CVE-2018-4366 would allow an attacker to view memory contents in CVE-2018-4367.

Safari 12.0.1 released and fixed 12 vulnerabilities that affected Safari Reader, WebKit with different vulnerabilities such as arbitrary code execution, Multiple memory corruption.

Apple Released Security Updates 

Name and information linkAvailable forRelease date
Safari 12.0.1macOS Sierra 10.12.6, macOS High Sierra 10.13.6, and macOS Mojave 10.1430 Oct 2018
iCloud for Windows 7.8Windows 7 and later30 Oct 2018
iTunes 12.9.1Windows 7 and later30 Oct 2018
watchOS 5.1Apple Watch Series 1 and later30 Oct 2018
iOS 12.1iPhone 5s and later, iPad Air and later, and iPod touch 6th generation30 Oct 2018
tvOS 12.1Apple TV 4K and Apple TV (4th generation)30 Oct 2018
macOS Mojave 10.14.1, Security Update 2018-001 High Sierra, Security Update 2018-005 SierramacOS Sierra 10.12.6, macOS High Sierra 10.13.6, macOS Mojave 10.1430 Oct 2018

Also you can Learn how to update the iOS software on your iPhone, iPad, or iPod touch.

Also Read:

Microsoft Released Security Updates & Fixed 49 Vulnerabilities that Affected Microsoft Products

Cisco Released Security Updates & Fixed 37 Vulnerabilities that Affected Cisco Products

Mozilla Firefox Releases 62.0.3 & Security Updates for 2 High Critical Vulnerabilities


Latest articles

CACTUS Hackers Exploiting Software Bug to Attack Corporate Networks

Threat actors known as CACTUS orchestrated a sophisticated attack on two companies simultaneously, exploiting...

GTPDOOR – Previously Unknown Linux Malware Attack Telecom Networks

Researchers have discovered a new backdoor named GTPDOOR that targets telecommunication network systems within...

US Court Orders NSO Group to Handover Code for Spyware, Pegasus to WhatsApp

Meta, the company that owns WhatsApp, filed a lawsuit against NSO Group in 2019....

New SSO-Based Phishing Attack Trick Users into Sharing Login Credentials  

Threat actors employ phishing scams to trick individuals into giving away important details like...

U.S. Charged Iranian Hacker, Rewards up to $10 Million

The United States Department of Justice (DoJ) has charged an Iranian national, Alireza Shafie...

Huge Surge in Ransomware-as-a-Service Attacks targeting Middle East & Africa

The Middle East and Africa (MEA) region has witnessed a surge in ransomware-as-a-service (RaaS)...

New Silver SAML Attack Let Attackers Forge Any SAML Response To Entra ID

SolarWinds cyberattack was one of the largest attacks of the century in which attackers...
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Live Account Takeover Attack Simulation

Live Account Take Over Attack

Live Webinar on How do hackers bypass 2FA ,Detecting ATO attacks, A demo of credential stuffing, brute force and session jacking-based ATO attacks, Identifying attacks with behaviour-based analysis and Building custom protection for applications and APIs.

Related Articles