1 min read

Update Apple Devices Soon for Important Security Patch

Apple released a very important security update today. The update fixes a pair of zero-day vulnerabilities that have been spotted in use in the wild to attack both Macs and iPhones. One of the two has been used to install the Pegasus spyware onto iPhones.

These two vulnerabilities are being tracked as CVE-2021-30860 and CVE-2021-30858 respectively. Both vulnerabilities allow attackers to create malicious documents which can be used to execute commands when opened on vulnerable devices.

CVE-2021-30860 is an integer overflow bug in CoreGrapics. It was discovered by CitizenLabs and it allows attackers to craft poisoned PDF documents that execute commands when opened on devices running either iOS or macOS.

CVE-2021-30858 is a WebKit vulnerability that allows attackers to create a malicious web page that executes commands on vulnerable devices running either iOS or macOS. That is any time vulnerable devices visit the poisoned page.

Both of These Have Been Spotted in the Wild

Apple stresses that both of these have been seen in use in the wilds which makes the application of Apple’s latest security patch a high priority.

Apple has struggled against zero-day vulnerabilities in 2021. So far the company has scrambled to address more than a dozen such vulnerabilities on macOS and iOS. That is compared to eleven found that targeted Windows and Android devices.

Consider the nature of these security flaws and the fact that they’re currently being exploited by hackers around the world. So downloading and applying this security patch is something that should be given top priority by anyone with Apple devices connected to your corporate network.

Kudos to the company for their rapid response. We hope however that the volume of zero-day exploits will begin to taper off in the near future. At this point it is unclear whether this is a sign of things to come and something that represents a larger and more disturbing trend or if it’s just a run of bad luck for the tech giant.

Used with permission from Article Aggregator

Your Cyber Defense Strategy Starts with Your IT Inventory

Your Cyber Defense Strategy Starts with Your IT Inventory

Imagine this: your law firm is facing a major cybersecurity audit. An auditor, clipboard in hand, asks a simple question: "Can you provide a complete...

Read More
Why Your Law Firm's Cybersecurity Depends on Continuing Education

Why Your Law Firm's Cybersecurity Depends on Continuing Education

You wouldn't trust a surgeon who stopped learning after medical school, so why would you trust your firm's digital security to someone whose...

Read More
The Great Legal Research Revolution: AI vs. Traditional Tools

The Great Legal Research Revolution: AI vs. Traditional Tools

The gavel has fallen, and the verdict is in: artificial intelligence has entered the courtroom and not as counsel, but as the most sophisticated...

Read More

Over 4,000 Online Shopping Retailers Hit with Data Breach

The UK’s National Cyber Security Centre (NCSC) has identified more than 4,000 different retailers that have been compromised by hackers exploiting...

Read More

Critical Security Issues Might Affect Many HP Printers

Do you have an HP LaserJet Pro, a Pagewide Pro, an OfficeJet, Enterprise, Large Format, or DeskJet printer at your home or in your office?

Read More
Exploits vs. Vulnerabilities

Exploits vs. Vulnerabilities

In today’s digital age, cyber threats are a daily reality for individuals and organizations alike. One of the most commonly used terms in the...

Read More