Search for an article

Select a plan

Choose a plan from below, subscribe, and get access to our exclusive articles!

Monthly plan

$
13
$
0
billed monthly

Yearly plan

$
100
$
0
billed yearly

All plans include

  • Donec sagittis elementum
  • Cras tempor massa
  • Mauris eget nulla ut
  • Maecenas nec mollis
  • Donec feugiat rhoncus
  • Sed tristique laoreet
  • Fusce luctus quis urna
  • In eu nulla vehicula
  • Duis eu luctus metus
  • Maecenas consectetur
  • Vivamus mauris purus
  • Aenean neque ipsum
Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

HomeRisk ManagementsiOS 18.3.2 Addresses Actively Exploited WebKit Vulnerability

iOS 18.3.2 Addresses Actively Exploited WebKit Vulnerability

Published on

spot_img

Apple has taken swift action to address a critical vulnerability in its iOS and iPadOS systems by releasing updates to fix the flaw. The vulnerability, identified as CVE-2025-24201, allowed malicious web content to break out of the Web Content sandbox, posing a serious security risk to users. Initially thought to have been resolved in a previous update, Apple has now issued iOS 18.3.2 and iPadOS 18.3.2 to fully patch the issue.

According to Apple, the vulnerability was actively exploited by cybercriminals in highly sophisticated attacks targeting specific individuals before the release of the new updates. This serves as a stark reminder of the importance of staying up to date with the latest security patches and software updates to protect against malicious threats.

Security experts like Adam Boynton, senior security strategy manager EMEIA at Jamf, have emphasized the critical nature of this vulnerability and the need for all iOS users to promptly install the updates. Boynton warned that cybercriminals will often target devices that have not been updated, making it essential for users to take action to safeguard their devices.

The flaw in WebKit, the framework that powers Safari and other web-based content on iOS, underscores the potential widespread consequences of vulnerabilities in such foundational components of the operating system. By exploiting this vulnerability, attackers could escape the Web Content sandbox and gain access to sensitive data in other parts of the system.

Users of supported devices, including iPhone XS and later models, multiple iPad Pro versions, as well as certain iPad Air and iPad mini models, are encouraged to update to iOS 18.3.2 and iPadOS 18.3.2 as soon as possible. This can be done by navigating to Settings, then General, and selecting Software Update to ensure protection against potential cyber threats.

The release of these updates reflects Apple’s commitment to addressing security concerns promptly and proactively. By staying vigilant and keeping devices updated with the latest patches, users can mitigate the risk of falling victim to cyber attacks that exploit known vulnerabilities. As cyber threats continue to evolve, maintaining a proactive approach to device security remains crucial in preserving the integrity and confidentiality of personal information.

Source link

Latest articles

F5 incorporates API Security and Networking to tackle AI Onslaught

In a groundbreaking move, the tech industry was abuzz with the announcement of the...

Australia regulator takes legal action against FIIG Securities for cybersecurity lapses

Australia regulator, the Australian Securities and Investments Commission (ASIC), has taken legal action against...

Managing unmanaged devices in the enterprise

Unmanaged devices on an organization's network can pose significant security risks and compliance issues....

INE Security Alert: Leveraging AI-Driven Cybersecurity Training to Combat Emerging Threats

Cary, North Carolina - In light of the growing surge of Artificial Intelligence (AI)-powered...

More like this

F5 incorporates API Security and Networking to tackle AI Onslaught

In a groundbreaking move, the tech industry was abuzz with the announcement of the...

Australia regulator takes legal action against FIIG Securities for cybersecurity lapses

Australia regulator, the Australian Securities and Investments Commission (ASIC), has taken legal action against...

Managing unmanaged devices in the enterprise

Unmanaged devices on an organization's network can pose significant security risks and compliance issues....