Remove tag webkit
article thumbnail

Apple released iOS 17.2 to address a dozen of security flaws

Security Affairs

Apple also addressed a code execution flaw, tracked as CVE-2023-42890, in the WebKit. The fact that the issues were discovered by Google TAG suggests they were exploited by a nation-state actor or by a surveillance firm. The IT giant addressed the flaw by improving memory handling. The flaw CVE-2023-42898 was discovered by Junsung Lee.

article thumbnail

Recently patched Apple and Chrome zero-days exploited to infect devices in Egypt with Predator spyware

Security Affairs

Citizen Lab and Google’s TAG revealed that the three recently patched Apple zero-days were used to install Cytrox Predator spyware. CVE-2023-41993 is an arbitrary code execution issue that resides in the Webkit. TAG experts explained that they were unable to capture the full Predator implant.

Spyware 110
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Apple addressed 2 new iOS zero-day vulnerabilities

Security Affairs

The flaws are actively exploited in attacks in the wild, both issues reside in the WebKit browser engine. The fact that the issues were discovered by Google TAG suggests they were exploited by a nation-state actor or by a surveillance firm. The first vulnerability, tracked as CVE-2023-42916, is an out-of-bounds read.

article thumbnail

In 2022, more than 40% of zero-day exploits used in the wild were variations of previous issues

Security Affairs

The popular Threat Analysis Group (TAG) Maddie Stone wrote Google’s fourth annual year-in-review of zero-day flaws exploited in-the-wild [ 2021 , 2020 , 2019 ], it is built off of the mid-year 2022 review. ” reads the report published by Google TAG.

article thumbnail

macOS Zero-Day exploited in watering hole attacks on users in Hong Kong

Security Affairs

Google TAG researchers discovered that threat actors leveraged a zero-day vulnerability in macOS in a watering hole campaign aimed at delivering malware to users in Hong Kong. “To protect our users, TAG routinely hunts for 0-day vulnerabilities exploited in-the-wild. and another for the exploit chain. Pierluigi Paganini.

Malware 137
article thumbnail

Apple addressed two actively exploited zero-day flaws

Security Affairs

Today, Apple published an emergency update for all iPhones to patch an exploit chain which we, together with @_clem1 (Google TAG) discovered in the wild. The flaw is a type confusion issue in WebKit that was addressed by the IT giant with improved checks.

article thumbnail

Google: four zero-day flaws have been exploited in the wild

Security Affairs

Security researchers from Google Threat Analysis Group (TAG) and Google Project Zero revealed that four zero-day vulnerabilities have been exploited in the wild earlier this year. The four security flaws were discovered earlier this year and affect Google Chrome, Internet Explorer, and WebKit browser engine.