Tag Apple

New SLAP and FLOP Attacks Reveal Vulnerabilities in Apple M-Series Chips to Speculative Execution Exploits

A recent analysis from a team at Georgia Institute of Technology and Ruhr University Bochum has unveiled two significant side-channel attacks specifically targeting Apple silicon chips, notably affecting popular web browsers such as Safari and Google Chrome. The attacks have been aptly codenamed Data Speculation Attacks via Load Address Prediction…

Read MoreNew SLAP and FLOP Attacks Reveal Vulnerabilities in Apple M-Series Chips to Speculative Execution Exploits

Researchers Warn: Tech-Savvy Stalkers Can Exploit Tile Tracking Tags

Concerns Emerge Over Privacy Risks Linked to Tile Trackers Tile trackers, employed by over 88 million users globally to locate items such as keys and pets, are facing scrutiny following revelations by researchers from the Georgia Institute of Technology. According to a study, design vulnerabilities within Tile’s tracking technology may…

Read MoreResearchers Warn: Tech-Savvy Stalkers Can Exploit Tile Tracking Tags

Apple Launches iOS Update for Older iPhones to Address Actively Exploited Security Flaw

Apple Inc. has recently rolled out critical security updates for legacy iPhone, iPad, and iPod touch devices, focusing on patching a significant vulnerability that has been found to be actively exploited. This flaw, designated as CVE-2022-32893, has garnered a CVSS score of 8.8 and represents an out-of-bounds write issue in…

Read MoreApple Launches iOS Update for Older iPhones to Address Actively Exploited Security Flaw

Apple Issues Fix for WebKit Zero-Day Vulnerability Used in Targeted Attacks

Apple Issues Critical Security Update for Zero-Day Vulnerability On Tuesday, Apple announced the release of a security update aimed at patching a significant zero-day vulnerability, identified by the CVE number CVE-2025-24201. This flaw, embedded within the WebKit browser engine, has reportedly been exploited in highly sophisticated attacks aimed at specific…

Read MoreApple Issues Fix for WebKit Zero-Day Vulnerability Used in Targeted Attacks

AsyncRAT Campaign Deploys Python Payloads and TryCloudflare Tunnels for Stealthy Attacks

Recent investigations have revealed a sophisticated malware campaign deploying a remote access trojan (RAT) called AsyncRAT, utilizing Python payloads and TryCloudflare tunnels for distribution. Forcepoint X-Labs researcher Jyotika Singh indicated that AsyncRAT capitalizes on the async/await programming model, allowing attackers to covertly access and manipulate infected systems, exfiltrate data, and…

Read MoreAsyncRAT Campaign Deploys Python Payloads and TryCloudflare Tunnels for Stealthy Attacks