Friday, June 21, 2024

Apple Released Security Updates for iOS, Safari , tvOS, iTunes & Fixed Several Vulnerabilities

Apple released security updates along with iOS 12.2 release and fixed 51 security vulnerabilities that affected various Apple products including iOS, macOS, Safari, tvOS, iTunes, iCloud.

iOS 12.2 released with the several security fixes that affected FaceTime, GeoServices, file, WebKit, Wi-Fi, Siri, Kernel and other iOS components.

macOS Mojave 10.14.4 security updates fixed the various WebKit holes, and kernel flaws that allow maliciously crafted NFS network share may lead to arbitrary code execution with system privileges.

Safari 12.1 update fixed vulnerabilities in Safari Readers let maliciously crafted webpage may lead to universal cross site scripting due to improper validation.

tvOS 12.2 fixes covered in the Apple TV 4K and Apple TV HD security flaws, iOS update, GeoServices flaw and one affecting Siri (CVE-2019-8502).

In this case, 19 iOS vulnerabilities were discovered in the Webkit browser engine used by Safari, Mail, App Store and other apps on macOS, iOS and Linux.

Apple Released Security Updates

Name and information linkAvailable forRelease date
iCloud for Windows 7.11Windows 7 and later25 Mar 2019
iTunes 12.9.4 for WindowsWindows 7 and later25 Mar 2019
Safari 12.1macOS Sierra 10.12.6, macOS High Sierra 10.13.6, and Mojave 10.14.425 Mar 2019
macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 SierramacOS Sierra 10.12.6, macOS High Sierra 10.13.6, and macOS Mojave 10.14.325 Mar 2019
tvOS 12.2Apple TV 4K and Apple TV HD previously Apple TV (4th generation)25 Mar 2019
Xcode 10.2macOS High Sierra 10.13.6 and later25 Mar 2019
iOS 12.2iPhone 5s and later, iPad Air and later, and iPod touch 6th generation25 Mar 2019

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Also Read:

Multiple Malicious Fitness Tracker apps Abusing Apple’s Touch ID Feature To Steal Money From iOS Users

5 Things You Need To Do Before Selling iPhone

New Unpatched macOS Zero-day Flaw Allows Attackers to Read Passwords in Plain Text & System Data


Latest articles

PrestaShop Website Under Injection Attack Via Facebook Module

A critical vulnerability has been discovered in the "Facebook" module (pkfacebook) from for...

Beware Of Illegal OTT Platforms That Exposes Sensitive Personal Information

A recent rise in data breaches from illegal Chinese OTT platforms exposes that user...

Beware Of Zergeca Botnet with Advanced Scanning & Persistence Features

A new botnet named Zergeca has emerged, showcasing advanced capabilities that set it apart...

Mailcow Mail Server Vulnerability Let Attackers Execute Remote Code

Two critical vulnerabilities (CVE-2024-31204 and CVE-2024-30270) affecting Mailcow versions before 2024-04 allow attackers to...

Hackers Attacking Vaults, Buckets, And Secrets To Steal Data

Hackers target vaults, buckets, and secrets to access some of the most classified and...

Hackers Weaponizing Windows Shortcut Files for Phishing

LNK files, a shortcut file type in Windows OS, provide easy access to programs,...

New Highly Evasive SquidLoader Attacking Employees Mimic As Word Document

Researchers discovered a new malware loader named SquidLoader targeting Chinese organizations, which arrives as...
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Free Webinar

API Vulnerability Scanning

71% of the internet traffic comes from APIs so APIs have become soft targets for hackers.Securing APIs is a simple workflow provided you find API specific vulnerabilities and protect them.In the upcoming webinar, join Vivek Gopalan, VP of Products at Indusface as he takes you through the fundamentals of API vulnerability scanning..
Key takeaways include:

  • Scan API endpoints for OWASP API Top 10 vulnerabilities
  • Perform API penetration testing for business logic vulnerabilities
  • Prioritize the most critical vulnerabilities with AcuRisQ
  • Workflow automation for this entire process

Related Articles