Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Apple WebKit Flaw Patched on iOS and macOS

Critical Apple WebKit Flaw Patched on iOS and macOS

Posted on March 18, 2026 By CWS

Apple has implemented urgent security updates to resolve a significant vulnerability in WebKit, which could allow harmful web content to bypass the Same Origin Policy on iOS and macOS.

Swift Response to Security Threat

These security enhancements were rolled out on March 17, 2026, targeting the most recent versions of Apple’s mobile and desktop operating systems. The updates are delivered through Apple’s Background Security Improvements, facilitating quick protection without extensive system reboots or major software installations.

Details of the WebKit Vulnerability

The security flaw, identified as CVE-2026-20643, was discovered by security expert Thomas Espach. It stems from a cross-origin issue within WebKit’s Navigation API. Typically, the Same Origin Policy is a crucial security measure in modern browsers, limiting interactions between different origins. However, this vulnerability allowed attackers to bypass these restrictions, risking exposure of user data and session hijacking.

Apple’s engineers have rectified the issue by enhancing input validation within the Navigation API, effectively sealing the cross-origin navigation loophole. The fix was distributed as a lightweight Background Security Improvement, providing essential protections for various system components.

Ensuring Device Security

The updates are specifically designed for iOS 26.3.1, iPadOS 26.3.1, macOS 26.3.1, and macOS 26.3.2. Users are advised to ensure their devices are configured to accept these automatic patches to remain protected from this WebKit vulnerability. Device settings can be managed via the Privacy & Security menu, accessible from the main Settings app on iPhones and iPads and through System Settings on Macs.

To prevent exposure to cross-origin attacks, users should activate the “Automatically Install” option under Background Security Improvements. Disabling this feature may leave devices susceptible until a manual software update is applied.

Stay informed with our latest updates by following us on Google News, LinkedIn, and X. For further inquiries or to share your cybersecurity stories, please contact us.

Cyber Security News Tags:Apple, CVE-2026-20643, Cybersecurity, IOS, macOS, Navigation API, same-origin policy, Security, security patch, Thomas Espach, Update, Vulnerability, WebKit

Post navigation

Previous Post: Manifold Secures $8 Million to Enhance AI Security
Next Post: Apple Enhances Security with New Update System

Related Posts

OpenAnt: AI Tool for Detecting Software Vulnerabilities OpenAnt: AI Tool for Detecting Software Vulnerabilities Cyber Security News
New Supply Chain Attack Targets Legitimate npm Package with 45,000 Weekly Downloads New Supply Chain Attack Targets Legitimate npm Package with 45,000 Weekly Downloads Cyber Security News
New SAP NetWeaver Vulnerabilities Allow Attackers to Bypass Authorization and Execute OS Commands New SAP NetWeaver Vulnerabilities Allow Attackers to Bypass Authorization and Execute OS Commands Cyber Security News
Android Photo Frames App Downloads Malware, Giving Hackers Control of The Device Without User Interaction Android Photo Frames App Downloads Malware, Giving Hackers Control of The Device Without User Interaction Cyber Security News
SmartApeSG Campaign Leverages ClickFix Technique to Deploy NetSupport RAT SmartApeSG Campaign Leverages ClickFix Technique to Deploy NetSupport RAT Cyber Security News
Threat actors Breach High Value targets like Google in Salesforce Attacks Threat actors Breach High Value targets like Google in Salesforce Attacks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • LeakNet Ramps Up Ransomware Attacks with New Techniques
  • Critical ScreenConnect Flaw Puts Remote Sessions at Risk
  • FancyBear Security Breach Uncovers NATO Espionage Efforts
  • Apple Enhances Security with New Update System
  • Critical Apple WebKit Flaw Patched on iOS and macOS

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • LeakNet Ramps Up Ransomware Attacks with New Techniques
  • Critical ScreenConnect Flaw Puts Remote Sessions at Risk
  • FancyBear Security Breach Uncovers NATO Espionage Efforts
  • Apple Enhances Security with New Update System
  • Critical Apple WebKit Flaw Patched on iOS and macOS

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark