Saturday, March 2, 2024

Apple Released Security Updates for Safari, iCloud, iOS ,macOS, watchOS, iTunes

Apple released security updates for many of their products including iOS, macOS, iCloud, iTunes along with fixes of some serious vulnerabilities.

Safari 11.1.1 released with fixes of some critical vulnerabilities that leads to the malicious website that may be able to cause a denial of service, address bar spoofing,  cookies being overwritten also it leads to attacker perform arbitrary code execution.

macOS High Sierra 10.13.5 released with a lot more security fixes for the vulnerabilities that exist in the  10.13.4 version.

Fixed vulnerabilities for macOS that leads to execute some of the dangerous attacks such as arbitrary code with kernel privileges, perform a denial of service attack, conduct impersonation attacks etc.

All these vulnerabilities are discovered in various Framework and applications such as Accessibility Framework, AMD, Bluetooth, FontParser,iBooks, Kernel.

Also, Apple Released patches for most recently discovered EFAIL Attacks that lead to Leaked Encrypted Emails in Plain Text. This issue was addressed with the improved isolation of MIME in Mail.

Windows WebKit based vulnerability patches released for iCloud for Windows 7.5, iTunes 12.7.5 for Windows.

All the Apple Watch models are Impacted by many of critical vulnerabilties such as gain elevated privileges that discovered by  Google Project Zero and other vulnerabilities were reported by various security researchers and firms.

Apple Released Security Updates

Name and information linkAvailable forRelease date
iCloud for Windows 7.5Windows 7 and later01 Jun 2018
Safari 11.1.1OS X El Capitan 10.11.6, macOS Sierra 10.12.6, and macOS High Sierra 10.13.401 Jun 2018
macOS High Sierra 10.13.5, Security Update 2018-003 Sierra, Security Update 2018-003 El CapitanOS X El Capitan 10.11.6, macOS Sierra 10.12.6, macOS High Sierra 10.13.401 Jun 2018
iOS 11.4iPhone 5s and later, iPad Air and later, and iPod touch 6th generation29 May 2018
watchOS 4.3.1All Apple Watch models29 May 2018
iTunes 12.7.5 for WindowsWindows 7 and later29 May 2018
tvOS 11.4Apple TV 4K and Apple TV (4th generation)29 May 2018

You can check the update process from following links and Apple advised user to update their product and maintain your Apple product’s security.

Also Read:

XMRig – New Cryptojacking Malware Attack on Apple Mac Devices

Penetration Testing Checklist with Android, windows, Apple & Blackberry Phones

Now Fix Available for Indian Telugu Character that Crashes Apple Devices


Latest articles

AI Worm Developed by Researchers Spreads Automatically Between AI Agents

Researchers have developed what they claim to be one of the first generative AI...

20 Million+ Cutout.Pro User Records Leaked On Hacking Forums

CutOut.Pro, an AI-powered photo and video editing platform, has reportedly suffered a data breach,...

CWE Version 4.14 Released: What’s New!

The Common Weakness Enumeration (CWE) project, a cornerstone in the cybersecurity landscape, has unveiled...

RisePro Stealer Attacks Windows Users Steals Sensitive Data

A new wave of cyber threats has emerged as the RisePro information stealer targets...

Golden Corral Restaurant Chain Hacked: 180,000+ Users’ Data Stolen

The Golden Corral Corporation, a popular American restaurant chain, has suffered a significant data...

CISA Warns Of Hackers Exploiting Multiple Flaws In Ivanti VPN

Threat actors target and abuse VPN flaws because VPNs are often used to secure...

BEAST AI Jailbreak Language Models Within 1 Minute With High Accuracy

Malicious hackers sometimes jailbreak language models (LMs) to exploit bugs in the systems so...
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Live Account Takeover Attack Simulation

Live Account Take Over Attack

Live Webinar on How do hackers bypass 2FA ,Detecting ATO attacks, A demo of credential stuffing, brute force and session jacking-based ATO attacks, Identifying attacks with behaviour-based analysis and Building custom protection for applications and APIs.

Related Articles