{"id":878912,"date":"2024-11-20T17:29:38","date_gmt":"2024-11-20T11:59:38","guid":{"rendered":"https:\/\/telecomlive.in\/web\/?p=878912"},"modified":"2024-11-21T07:09:37","modified_gmt":"2024-11-21T01:39:37","slug":"apple-issues-update-for-mac-users-targeted-in-zero-day-cyber-attack","status":"publish","type":"post","link":"https:\/\/telecomlive.in\/web\/2024\/11\/20\/apple-issues-update-for-mac-users-targeted-in-zero-day-cyber-attack\/","title":{"rendered":"Apple issues update for Mac users targeted in zero-day cyber attack"},"content":{"rendered":"<p>San Francisco: Apple has issued a software update for bugs &#8216;actively exploited&#8217; by cyber-criminals in targeting Intel-based Mac systems.<br \/>\nIn a security advisory, the tech giant said it was aware of two vulnerabilities that &#8220;may have been actively exploited on Intel-based Mac systems.&#8221; <\/p>\n<p>These bugs are considered &#8220;zero day&#8221; vulnerabilities. To fix those, Apple released a software update for macOS (called macOS Sequoia 15.1.1), as well as fixes for iPhones and iPads, including users running the older iOS 17 software. <\/p>\n<p>&#8220;Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited on Intel-based Mac systems,&#8221; said the company. <\/p>\n<p>The issue was addressed with improved checks, it added. It&#8217;s not yet known who is behind the attacks targeting Mac users, or how many Mac users have been targeted <\/p>\n<p>The vulnerabilities were reported by security researchers at Google&#8217;s Threat Analysis Group. <\/p>\n<p>These vulnerabilities relate to WebKit and JavaScriptCore, the web engines that power the Safari browser and for running web content. <\/p>\n<p>Apple users should update their iPhones, iPads, and Macs as soon as possible. <\/p>\n<p>In July, the tech giant Apple issued a fresh warning to iPhone users in at least 98 countries, including in India, about a potential new mercenary spyware attack like &#8216;Pegasus&#8217;. <\/p>\n<p>According to the Apple warning, it detected that &#8220;you are being targeted by a mercenary spyware attack that is trying to remotely compromise the iPhone associated with your Apple ID&#8221;. <\/p>\n<p>In the warning, the iPhone maker further said that this attack is &#8220;likely targeting you specifically because of who you are or what you do&#8221;. <\/p>\n<p>In April this year, the tech giant sent threat notifications to select users in 92 countries, including some in India, who may have been targeted using &#8216;mercenary spyware&#8217; like Pegasus from the NSO Group.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>San Francisco: Apple has issued a software update for bugs &#8216;actively exploited&#8217; by cyber-criminals in targeting Intel-based Mac systems. In a security advisory, the tech giant said it was aware of two vulnerabilities that &#8220;may have been actively exploited on Intel-based Mac systems.&#8221; These bugs are considered &#8220;zero day&#8221; vulnerabilities. To fix those, Apple released a software update for macOS (called macOS Sequoia 15.1.1), as well as fixes for iPhones and iPads, including users running the older iOS 17 software. &#8220;Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[7],"tags":[],"class_list":["post-878912","post","type-post","status-publish","format-standard","hentry","category-it-2"],"acf":[],"_links":{"self":[{"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/posts\/878912","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/comments?post=878912"}],"version-history":[{"count":0,"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/posts\/878912\/revisions"}],"wp:attachment":[{"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/media?parent=878912"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/categories?post=878912"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/telecomlive.in\/web\/wp-json\/wp\/v2\/tags?post=878912"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}