Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Apple Patches WebKit Flaw in iOS and macOS

Apple Patches WebKit Flaw in iOS and macOS

Posted on March 18, 2026 By CWS

Apple has initiated a series of Background Security Improvements to rectify a security issue within the WebKit framework impacting iOS, iPadOS, and macOS. The flaw, identified as CVE-2026-20643, allows for a potential bypass of the same-origin policy through malicious web content.

Details of the WebKit Vulnerability

The vulnerability affects multiple versions, including iOS 26.3.1, iPadOS 26.3.1, and macOS 26.3.1 and 26.3.2. It has been mitigated by enhancing input validation across these platforms. Credit for uncovering this flaw goes to security researcher Thomas Espach.

Apple’s Background Security Improvements are designed to provide targeted security enhancements to essential components like the Safari browser and WebKit framework. These updates are distributed as smaller patches, separate from major software updates, ensuring timely security interventions.

Managing Security Improvements

The Background Security Improvements feature is available from iOS 26.1, iPadOS 26.1, and macOS 26 onward. Users can manage these updates through the Privacy and Security settings on their devices, with an option to enable automatic installations for seamless protection.

Note that if users choose to disable this feature, they will have to wait for the next software update to receive these security enhancements. This mechanism is akin to the Rapid Security Response feature introduced in iOS 16, which also facilitated minor security updates.

Implications and Future Outlook

If a user decides to remove a Background Security Improvement, their device will revert to the previous software version without the enhancements. Apple’s documentation clarifies this process to ensure user awareness.

This development follows Apple’s recent efforts to address a zero-day vulnerability (CVE-2026-20700) affecting several platforms, including iOS and macOS. Additionally, Apple has expanded patches for several other security vulnerabilities, highlighting its ongoing commitment to user safety.

As cyber threats continue to evolve, Apple’s proactive approach to security through frequent and targeted updates plays a critical role in maintaining the integrity and safety of its devices worldwide.

The Hacker News Tags:Apple, Background Security Improvements, CVE-2026-20643, IOS, macOS, same-origin policy, security patches, security update, Vulnerability, WebKit

Post navigation

Previous Post: Critical Vulnerability in Ubuntu Allows Root Access
Next Post: Microsoft Pauses Automatic 365 Copilot App Installations

Related Posts

Blind Eagle’s Five Clusters Target Colombia Using RATs, Phishing Lures, and Dynamic DNS Infra Blind Eagle’s Five Clusters Target Colombia Using RATs, Phishing Lures, and Dynamic DNS Infra The Hacker News
Russian Hackers Breach 20+ NGOs Using Evilginx Phishing via Fake Microsoft Entra Pages Russian Hackers Breach 20+ NGOs Using Evilginx Phishing via Fake Microsoft Entra Pages The Hacker News
New COLDRIVER Malware Campaign Joins BO Team and Bearlyfy in Russia-Focused Cyberattacks New COLDRIVER Malware Campaign Joins BO Team and Bearlyfy in Russia-Focused Cyberattacks The Hacker News
CISA Adds Citrix NetScaler CVE-2025-5777 to KEV Catalog as Active Exploits Target Enterprises CISA Adds Citrix NetScaler CVE-2025-5777 to KEV Catalog as Active Exploits Target Enterprises The Hacker News
Android Malware Poses Threat to Mobile Banking Users Android Malware Poses Threat to Mobile Banking Users The Hacker News
CISA Adds Four Critical Vulnerabilities to KEV Catalog Due to Active Exploitation CISA Adds Four Critical Vulnerabilities to KEV Catalog Due to Active Exploitation The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Ubuntu Security Flaw CVE-2026-3888 Enables Root Access
  • Microsoft Pauses Automatic 365 Copilot App Installations
  • Apple Patches WebKit Flaw in iOS and macOS
  • Critical Vulnerability in Ubuntu Allows Root Access
  • Critical Telnetd Security Flaw Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Ubuntu Security Flaw CVE-2026-3888 Enables Root Access
  • Microsoft Pauses Automatic 365 Copilot App Installations
  • Apple Patches WebKit Flaw in iOS and macOS
  • Critical Vulnerability in Ubuntu Allows Root Access
  • Critical Telnetd Security Flaw Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark