Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Google’s AI ‘Big Sleep’ Finds 5 New Vulnerabilities in Apple’s Safari WebKit

Google’s AI ‘Big Sleep’ Finds 5 New Vulnerabilities in Apple’s Safari WebKit

Posted on November 4, 2025November 4, 2025 By CWS

Nov 04, 2025Ravie LakshmananArtificial Intelligence / Vulnerability
Google’s synthetic intelligence (AI)-powered cybersecurity agent known as Massive Sleep has been credited by Apple for locating as many as 5 totally different safety flaws within the WebKit element utilized in its Safari net browser that, if efficiently exploited, may lead to a browser crash or reminiscence corruption.
The record of vulnerabilities is as follows –

CVE-2025-43429 – A buffer overflow vulnerability which will result in an sudden course of crash when processing maliciously crafted net content material (addressed via improved bounds checking)
CVE-2025-43430 – An unspecified vulnerability that would lead to an sudden course of crash when processing maliciously crafted net content material (addressed via improved state administration)
CVE-2025-43431 & CVE-2025-43433 – Two unspecified vulnerabilities which will result in reminiscence corruption when processing maliciously crafted net content material (addressed via improved reminiscence dealing with)
CVE-2025-43434 – A use-after-free vulnerability which will result in an sudden Safari crash when processing maliciously crafted net content material (addressed via improved state administration)

Patches for the shortcomings have been launched by Apple on Monday as a part of iOS 26.1, iPadOS 26.1, macOS Tahoe 26.1, tvOS 26.1, watchOS 26.1, visionOS 26.1, and Safari 26.1. The updates can be found for the next units and working methods –

iOS 26.1 and iPadOS 26.1 – iPhone 11 and later, iPad Professional 12.9-inch third era and later, iPad Professional 11-inch 1st era and later, iPad Air third era and later, iPad eighth era and later, and iPad mini fifth era and later
macOS Tahoe 26.1 – Macs operating macOS Tahoe
tvOS 26.1 – Apple TV 4K (2nd era and later)
visionOS 26.1 – Apple Imaginative and prescient Professional (all fashions)
watchOS 26.1 – Apple Watch Sequence 6 and later
Safari 26.1 – Macs operating macOS Sonoma and macOS Sequoia

Massive Sleep, previously known as Venture Naptime, is an AI agent launched by Google final 12 months as a part of a collaboration between DeepMind and Google Venture Zero to allow automated vulnerability discovery.
Earlier this 12 months, Google stated the massive language mannequin (LLM)-assisted framework recognized a safety flaw in SQLite (CVE-2025-6965, CVSS rating: 7.2) that it stated was at “danger of being exploited” by malicious actors.
Whereas not one of the vulnerabilities listed in Monday’s safety bulletins have been flagged as exploited within the wild, it is all the time a very good follow to maintain units up to date to the newest model for optimum safety.

The Hacker News Tags:Apples, Big, Finds, Googles, Safari, Sleep, Vulnerabilities, WebKit

Post navigation

Previous Post: Weaponized Putty and Teams Ads Deliver Malware Allowing Hackers to Access Network
Next Post: Android Update Patches Critical Remote Code Execution Flaw

Related Posts

Google Disrupts IPIDEA — One of the World’s Largest Residential Proxy Networks Google Disrupts IPIDEA — One of the World’s Largest Residential Proxy Networks The Hacker News
CERT-UA Warns of HTA-Delivered C# Malware Attacks Using Court Summons Lures CERT-UA Warns of HTA-Delivered C# Malware Attacks Using Court Summons Lures The Hacker News
New Linux Flaws Enable Full Root Access via PAM and Udisks Across Major Distributions New Linux Flaws Enable Full Root Access via PAM and Udisks Across Major Distributions The Hacker News
Europol Dismantles 0 Million Cryptocurrency Fraud Network, Arrests Five Suspects Europol Dismantles $540 Million Cryptocurrency Fraud Network, Arrests Five Suspects The Hacker News
Critical Metro4Shell Vulnerability Exploited in React Native Critical Metro4Shell Vulnerability Exploited in React Native The Hacker News
PolarEdge Targets Cisco, ASUS, QNAP, Synology Routers in Expanding Botnet Campaign PolarEdge Targets Cisco, ASUS, QNAP, Synology Routers in Expanding Botnet Campaign The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News