Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Apple Patches Safari Vulnerability Also Exploited as Zero-Day in Google Chrome

Posted on July 30, 2025July 30, 2025 By CWS

Jul 30, 2025Ravie LakshmananVulnerability / Zero-Day
Apple on Tuesday launched safety updates for its complete software program portfolio, together with a repair for a vulnerability that Google stated was exploited as a zero-day within the Chrome internet browser earlier this month.
The vulnerability, tracked as CVE-2025-6558 (CVSS rating: 8.8), is an incorrect validation of untrusted enter within the browser’s ANGLE and GPU parts that would end in a sandbox escape through a crafted HTML web page.
Whereas there are not any particulars on how the difficulty has been weaponized by menace actors, Google acknowledged that an “exploit for CVE-2025-6558 exists within the wild.” Clément Lecigne and Vlad Stolyarov of Google’s Menace Evaluation Group (TAG) have been credited with discovering and reporting the shortcoming.
The iPhone maker, in its newest spherical of software program updates, additionally included patches for CVE-2025-6558, stating the vulnerability impacts the WebKit browser engine that powers its Safari browser.

“This can be a vulnerability in open-source code and Apple Software program is among the many affected initiatives,” the corporate stated in an advisory, including it may very well be exploited to end in an surprising crash of Safari when processing maliciously crafted internet content material.
The bug has been addressed within the following variations –

iOS 18.6 and iPadOS 18.6 – iPhone XS and later, iPad Professional 13-inch, iPad Professional 12.9-inch third era and later, iPad Professional 11-inch 1st era and later, iPad Air third era and later, iPad seventh era and later, and iPad mini fifth era and later
iPadOS 17.7.9 – iPad Professional 12.9-inch 2nd era, iPad Professional 10.5-inch, and iPad sixth era
macOS Sequoia 15.6 – Macs operating macOS Sequoia
tvOS 18.6 – Apple TV HD and Apple TV 4K (all fashions)
watchOS 11.6 – Apple Watch Collection 6 and later
visionOS 2.6 – Apple Imaginative and prescient Professional

Whereas there isn’t a proof that the vulnerability has been used to focus on Apple gadget customers, it is all the time observe to replace to the most recent variations of the software program for optimum safety.

The Hacker News Tags:Apple, Chrome, Exploited, Google, Patches, Safari, Vulnerability, ZeroDay

Post navigation

Previous Post: Global Authorities Share IoCs and TTPs of Scattered Spider Behind Major ESXi Ransomware Attacks
Next Post: A Look Inside Pillar’s AI Security Platform

Related Posts

Fake VPN and Spam Blocker Apps Tied to VexTrio Used in Ad Fraud, Subscription Scams The Hacker News
Storm-2603 Exploits SharePoint Flaws to Deploy Warlock Ransomware on Unpatched Systems The Hacker News
Now-Patched Fortinet FortiWeb Flaw Exploited in Attacks to Create Admin Accounts The Hacker News
How One Bad Password Ended a 158-Year-Old Business The Hacker News
CISA Warns of Actively Exploited Critical Oracle Identity Manager Zero-Day Vulnerability The Hacker News
Newly Emerged GLOBAL GROUP RaaS Expands Operations with AI-Driven Negotiation Tools The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • APT-C-35 Infrastructure Activity Leveraged Using Apache HTTP Response Indicators
  • Russian Hackers Attacking Network Edge Devices in Western Critical Infrastructure
  • LLMs are Accelerating the Ransomware Operations with Functional Tools and RaaS
  • Hackers Can Manipulate Internet-Based Solar Panel Systems to Execute Attacks in Minutes
  • From Open Source to OpenAI: The Evolution of Third-Party Risk

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • APT-C-35 Infrastructure Activity Leveraged Using Apache HTTP Response Indicators
  • Russian Hackers Attacking Network Edge Devices in Western Critical Infrastructure
  • LLMs are Accelerating the Ransomware Operations with Functional Tools and RaaS
  • Hackers Can Manipulate Internet-Based Solar Panel Systems to Execute Attacks in Minutes
  • From Open Source to OpenAI: The Evolution of Third-Party Risk

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark