Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
  • AI
  • Tech
  • Cybersecurity
  • Finance
  • DeFi & Blockchain
  • Startups
  • Gaming
Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
Dataconomy
No Result
View All Result

Apple’s just fixed two nasty zero-day exploits

The first bug affects Apple's Core Audio component, allowing malicious code execution through a crafted media file. The second bug allows attackers to bypass pointer authentication, a security feature that prevents malicious code injection into a device's memory.

byKerem Gülen
April 17, 2025
in Cybersecurity, News
Home News Cybersecurity

Apple has released software updates to fix two zero-day vulnerabilities in its products, which may have been actively exploited to hack customers running its iOS mobile software, targeting specific individuals.

The company confirmed in security advisories that the bugs were fixed after being exploited in sophisticated attacks. The vulnerabilities were unknown to Apple until they were being used, hence classified as zero days.

The attackers’ identities and the number of affected Apple customers remain unknown. Apple credited Google’s Threat Analysis Group for discovering one of the bugs, suggesting a potential nation-state or government-backed cyberattack.

Stay Ahead of the Curve!

Don't miss out on the latest insights, trends, and analysis in the world of data, technology, and startups. Subscribe to our newsletter and get exclusive content delivered straight to your inbox.


First Chrome zero-day of 2025 shows just how fragile browser security is


The first bug affects Apple’s Core Audio component, allowing malicious code execution through a crafted media file. The second bug allows attackers to bypass pointer authentication, a security feature that prevents malicious code injection into a device’s memory.

Apple released updates for macOS Sequoia (version 15.4.1), iOS 18.4.1 for iPhones and iPads, as well as updates for Apple TV and Vision Pro, to fix the security bugs.


Featured image credit

Tags: Applezero-day

Related Posts

Nvidia and OpenAI announce landmark 0 billion partnership, igniting global stock rally

Nvidia and OpenAI announce landmark $100 billion partnership, igniting global stock rally

September 23, 2025
Perplexity Max gets email assistant for Gmail and Outlook

Perplexity Max gets email assistant for Gmail and Outlook

September 23, 2025
Germany seeks to block Apple, Google from EU’s FiDA

Germany seeks to block Apple, Google from EU’s FiDA

September 23, 2025
Created by Humans licenses author content to AI firms

Created by Humans licenses author content to AI firms

September 23, 2025
Sentinelone finds malterminal malware using OpenAI GPT-4

Sentinelone finds malterminal malware using OpenAI GPT-4

September 23, 2025
FBI warns of fake IC3 websites stealing data

FBI warns of fake IC3 websites stealing data

September 23, 2025

LATEST NEWS

Nvidia and OpenAI announce landmark $100 billion partnership, igniting global stock rally

Perplexity Max gets email assistant for Gmail and Outlook

Germany seeks to block Apple, Google from EU’s FiDA

Created by Humans licenses author content to AI firms

Sentinelone finds malterminal malware using OpenAI GPT-4

FBI warns of fake IC3 websites stealing data

Dataconomy

COPYRIGHT © DATACONOMY MEDIA GMBH, ALL RIGHTS RESERVED.

  • About
  • Imprint
  • Contact
  • Legal & Privacy

Follow Us

  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
No Result
View All Result
Subscribe

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy Policy.