Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Google’s AI ‘Big Sleep’ Finds 5 New Vulnerabilities in Apple’s Safari WebKit

Google’s AI ‘Big Sleep’ Finds 5 New Vulnerabilities in Apple’s Safari WebKit

Posted on November 4, 2025November 4, 2025 By CWS

Nov 04, 2025Ravie LakshmananArtificial Intelligence / Vulnerability
Google’s synthetic intelligence (AI)-powered cybersecurity agent known as Massive Sleep has been credited by Apple for locating as many as 5 totally different safety flaws within the WebKit element utilized in its Safari net browser that, if efficiently exploited, may lead to a browser crash or reminiscence corruption.
The record of vulnerabilities is as follows –

CVE-2025-43429 – A buffer overflow vulnerability which will result in an sudden course of crash when processing maliciously crafted net content material (addressed via improved bounds checking)
CVE-2025-43430 – An unspecified vulnerability that would lead to an sudden course of crash when processing maliciously crafted net content material (addressed via improved state administration)
CVE-2025-43431 & CVE-2025-43433 – Two unspecified vulnerabilities which will result in reminiscence corruption when processing maliciously crafted net content material (addressed via improved reminiscence dealing with)
CVE-2025-43434 – A use-after-free vulnerability which will result in an sudden Safari crash when processing maliciously crafted net content material (addressed via improved state administration)

Patches for the shortcomings have been launched by Apple on Monday as a part of iOS 26.1, iPadOS 26.1, macOS Tahoe 26.1, tvOS 26.1, watchOS 26.1, visionOS 26.1, and Safari 26.1. The updates can be found for the next units and working methods –

iOS 26.1 and iPadOS 26.1 – iPhone 11 and later, iPad Professional 12.9-inch third era and later, iPad Professional 11-inch 1st era and later, iPad Air third era and later, iPad eighth era and later, and iPad mini fifth era and later
macOS Tahoe 26.1 – Macs operating macOS Tahoe
tvOS 26.1 – Apple TV 4K (2nd era and later)
visionOS 26.1 – Apple Imaginative and prescient Professional (all fashions)
watchOS 26.1 – Apple Watch Sequence 6 and later
Safari 26.1 – Macs operating macOS Sonoma and macOS Sequoia

Massive Sleep, previously known as Venture Naptime, is an AI agent launched by Google final 12 months as a part of a collaboration between DeepMind and Google Venture Zero to allow automated vulnerability discovery.
Earlier this 12 months, Google stated the massive language mannequin (LLM)-assisted framework recognized a safety flaw in SQLite (CVE-2025-6965, CVSS rating: 7.2) that it stated was at “danger of being exploited” by malicious actors.
Whereas not one of the vulnerabilities listed in Monday’s safety bulletins have been flagged as exploited within the wild, it is all the time a very good follow to maintain units up to date to the newest model for optimum safety.

The Hacker News Tags:Apples, Big, Finds, Googles, Safari, Sleep, Vulnerabilities, WebKit

Post navigation

Previous Post: Weaponized Putty and Teams Ads Deliver Malware Allowing Hackers to Access Network
Next Post: Android Update Patches Critical Remote Code Execution Flaw

Related Posts

OFAC Sanctions North Korean IT Network Exploiting Remote Jobs OFAC Sanctions North Korean IT Network Exploiting Remote Jobs The Hacker News
Scattered Spider Hacker Gets 10 Years, M Restitution for SIM Swapping Crypto Theft Scattered Spider Hacker Gets 10 Years, $13M Restitution for SIM Swapping Crypto Theft The Hacker News
Go-Based Malware Deploys XMRig Miner on Linux Hosts via Redis Configuration Abuse Go-Based Malware Deploys XMRig Miner on Linux Hosts via Redis Configuration Abuse The Hacker News
Senator Wyden Urges FTC to Probe Microsoft for Ransomware-Linked Cybersecurity Negligence Senator Wyden Urges FTC to Probe Microsoft for Ransomware-Linked Cybersecurity Negligence The Hacker News
Essential Steps CISOs Must Take for SOC Efficiency Essential Steps CISOs Must Take for SOC Efficiency The Hacker News
PLUGGYAPE Malware Uses Signal and WhatsApp to Target Ukrainian Defense Forces PLUGGYAPE Malware Uses Signal and WhatsApp to Target Ukrainian Defense Forces The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark