Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Apple Patches Safari Vulnerability Also Exploited as Zero-Day in Google Chrome

Posted on July 30, 2025July 30, 2025 By CWS

Jul 30, 2025Ravie LakshmananVulnerability / Zero-Day
Apple on Tuesday launched safety updates for its complete software program portfolio, together with a repair for a vulnerability that Google stated was exploited as a zero-day within the Chrome internet browser earlier this month.
The vulnerability, tracked as CVE-2025-6558 (CVSS rating: 8.8), is an incorrect validation of untrusted enter within the browser’s ANGLE and GPU parts that would end in a sandbox escape through a crafted HTML web page.
Whereas there are not any particulars on how the difficulty has been weaponized by menace actors, Google acknowledged that an “exploit for CVE-2025-6558 exists within the wild.” Clément Lecigne and Vlad Stolyarov of Google’s Menace Evaluation Group (TAG) have been credited with discovering and reporting the shortcoming.
The iPhone maker, in its newest spherical of software program updates, additionally included patches for CVE-2025-6558, stating the vulnerability impacts the WebKit browser engine that powers its Safari browser.

“This can be a vulnerability in open-source code and Apple Software program is among the many affected initiatives,” the corporate stated in an advisory, including it may very well be exploited to end in an surprising crash of Safari when processing maliciously crafted internet content material.
The bug has been addressed within the following variations –

iOS 18.6 and iPadOS 18.6 – iPhone XS and later, iPad Professional 13-inch, iPad Professional 12.9-inch third era and later, iPad Professional 11-inch 1st era and later, iPad Air third era and later, iPad seventh era and later, and iPad mini fifth era and later
iPadOS 17.7.9 – iPad Professional 12.9-inch 2nd era, iPad Professional 10.5-inch, and iPad sixth era
macOS Sequoia 15.6 – Macs operating macOS Sequoia
tvOS 18.6 – Apple TV HD and Apple TV 4K (all fashions)
watchOS 11.6 – Apple Watch Collection 6 and later
visionOS 2.6 – Apple Imaginative and prescient Professional

Whereas there isn’t a proof that the vulnerability has been used to focus on Apple gadget customers, it is all the time observe to replace to the most recent variations of the software program for optimum safety.

The Hacker News Tags:Apple, Chrome, Exploited, Google, Patches, Safari, Vulnerability, ZeroDay

Post navigation

Previous Post: Global Authorities Share IoCs and TTPs of Scattered Spider Behind Major ESXi Ransomware Attacks
Next Post: A Look Inside Pillar’s AI Security Platform

Related Posts

300 Servers and €3.5M Seized as Europol Strikes Ransomware Networks Worldwide The Hacker News
Zero-Day Exploits, Insider Threats, APT Targeting, Botnets and More The Hacker News
How to Deploy AI More Securely at Scale The Hacker News
The Unusual Suspect: Git Repos The Hacker News
Critical Wing FTP Server Vulnerability (CVE-2025-47812) Actively Being Exploited in the Wild The Hacker News
OneClik Malware Targets Energy Sector Using Microsoft ClickOnce and Golang Backdoors The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Chinese Researchers Suggest Lasers and Sabotage to Counter Musk’s Starlink Satellites
  • Threat Actors Weaponizes LNK Files to Deploy RedLoader Malware on Windows Systems
  • N. Korean Hackers Used Job Lures, Cloud Account Access, and Malware to Steal Millions in Crypto
  • Who’s Really Behind the Mask? Combatting Identity Fraud
  • UNC2891 Threat Actors Hacked ATM Networks Using 4G Raspberry Pi Device

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Chinese Researchers Suggest Lasers and Sabotage to Counter Musk’s Starlink Satellites
  • Threat Actors Weaponizes LNK Files to Deploy RedLoader Malware on Windows Systems
  • N. Korean Hackers Used Job Lures, Cloud Account Access, and Malware to Steal Millions in Crypto
  • Who’s Really Behind the Mask? Combatting Identity Fraud
  • UNC2891 Threat Actors Hacked ATM Networks Using 4G Raspberry Pi Device

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News