Close Menu
Edu Expertise Hub
    Facebook X (Twitter) Instagram
    Monday, August 25
    • About us
    • Contact
    • Submit Coupon
    Facebook X (Twitter) Instagram YouTube
    Edu Expertise Hub
    • Home
    • Udemy Coupons
    • Best Online Courses and Software Tools
      • Business & Investment
      • Computers & Internet
      • eBusiness and eMarketing
    • Reviews
    • Jobs
    • Latest News
    • Blog
    • Videos
    Edu Expertise Hub
    Home » Latest News » Apple iOS update fixes new iPhone zero-day flaw
    Latest News

    Apple iOS update fixes new iPhone zero-day flaw

    TeamBy TeamAugust 25, 2025No Comments3 Mins Read0 Views
    Facebook Twitter Pinterest LinkedIn Telegram Tumblr Email
    Apple iOS update fixes new iPhone zero-day flaw
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Apple has pushed another update to its mobile operating systems, iOS and iPadOS, to address a newly-discovered zero-day that is already being exploited by threat actors in the wild to enable so-called zero-click attacks.

    Tracked as CVE-2025-43300, the flaw is an out-of-bounds write issue in the ImageIO framework – which is used to enable applications to read and write the majority of image file formats.

    If successfully exploited, processing a maliciously crafted-image file results in memory corruption on the target device.

    “Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals,” Apple said in its customarily sparse advisory.

    The update, which takes iOS and iPadOS to version 18.6.2, addresses this problem with improved bounds checking.

    Adam Boynton, senior security strategy manager for EMEIA at Jamf, an Apple device management specialist, explained that the flaw could potentially be used by threat actors to compromise the device and enable the execution of malicious code.

    In these zero-click attacks, malicious payloads are generally delivered via channels such as text message, email, or messaging apps. These payloads contain data packets that are designed to trigger the vulnerability automatically, without any user interaction taking place – hence the term zero-click.

    This stealthy methodology means zero-clicks are tricky for enterprise defenders to get to grips with, not least because they are hard to detect and bypass end-user training, but also because they often leave very little in terms of forensic evidence and can operate without setting off any security alerts.

    Zero-click attacks have also been proven to be highly effective against high-value targets within businesses, and additionally for certain categories of organisations and individuals at risk of targeted cyber-espionage, such as non-governmental organisations (NGOs), journalists and media, and activists and politicians.

    “Apple has indicated that this vulnerability has been exploited in sophisticated, targeted attacks, which typically focus on individuals with highly valued access or contacts, such as journalists, lawyers, activists, and government officials,” said Boynton.

    “While Apple has not confirmed whether this specific flaw was linked to spyware, similar vulnerabilities in ImageIO and WebKit have previously been used in Pegasus campaigns.”

    Mitigating zero-click attacks

    Sylvain Cortes, vice president of strategy at Hackuity, a vulnerability management platform, said: “With the vulnerability being actively exploited, everyone should check their iPhones immediately. Organisations handling Apple devices need to be able to identify and update all affected devices immediately, especially if they operate in at-risk fields like the legal, media and public sectors.” 

    When responding to zero-click vulnerabilities, security professionals can help turn the odds in their favour not only by aggressively patching against them, but also by keeping up-to-date on threat intelligence, deploying defence-in-depth strategies with layered security protections, and introducing technologies such as micro-segmentation, endpoint detection and response (EDR) tools, and mobile device management (MDM) services.

    Meanwhile, individual Apple users can check if their iPhones or iPads are running the updated version 18.6.2 by navigating to Settings, General, and Software Update on their devices.

    The update to version 18.6.2 will likely be among the final releases to take place ahead of the anticipated unveiling of iOS 26, which still looks to be on track for mid-September. This will accompany the launch of the iPhone 17.

    This post is exclusively published on eduexpertisehub.com

    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Team

      Related Posts

      Is gamification they key to achieving true inclusion in special education?

      August 25, 2025

      What if Literacy Instruction Went Beyond Building Knowledge?

      August 24, 2025

      Preventing harm by connecting the dots in school safety

      August 24, 2025

      Scale of MoD Afghan data breaches widens dramatically

      August 23, 2025

      More Schools Are Considering Education-Focused AI Tools. What’s the Best Way to Use Them?

      August 23, 2025

      The complex dynamics of principal turnover in modern educational institutions

      August 22, 2025
      Courses and Software Tools

      Extreme Privacy: What It Takes to Disappear

      August 24, 202462 Views

      Modern C++ Programming Cookbook: Master Modern C++ with comprehensive solutions for C++23 and all previous standards

      September 18, 202429 Views

      Meebook E-Reader M7 | 6.8′ Eink Carta Screen | 300PPI Smart Light | Android 11 | Ouad Core Processor | Out Speaker | Support Google Play Store | 3GB+32GB Storage | Micro-SD Slot | Gray

      August 19, 202423 Views

      Coders at Work: Reflections on the Craft of Programming

      April 19, 202518 Views

      HR from the Outside In: Six Competencies for the Future of Human Resources

      May 20, 202517 Views
      Reviews

      Malware Analysis, Incident Response, Disaster Recovery & BCP | Udemy Coupons 2025

      August 25, 2025

      UI Developer

      August 25, 2025

      social media marketing for business: 6 BOOKS IN 1: socialmediamarketing for business2019/socialmediamarketing for beginners/dropshipping/makemoneyonlinewithdropshipping/selling withamazonfba/amazonfba

      August 25, 2025

      How Finance Works: The HBR Guide to Thinking Smart About the Numbers

      August 25, 2025

      Protecting Business with Cyber Insurance: Future trends in cyber insurance | Cyber risk management strategies | Cyber insurance for protecting businesses | Digital security | Cybercrime protection

      August 25, 2025
      Stay In Touch
      • Facebook
      • YouTube
      • TikTok
      • WhatsApp
      • Twitter
      • Instagram
      Latest News

      Is gamification they key to achieving true inclusion in special education?

      August 25, 2025

      Apple iOS update fixes new iPhone zero-day flaw

      August 25, 2025

      What if Literacy Instruction Went Beyond Building Knowledge?

      August 24, 2025

      Preventing harm by connecting the dots in school safety

      August 24, 2025

      Scale of MoD Afghan data breaches widens dramatically

      August 23, 2025
      Latest Videos

      The Ethical Hacker Career You Never Knew Existed

      August 25, 2025

      6 Best Certifications To Persue with a Finance Degree | Boost Your Career in Finance

      August 24, 2025

      Digital Marketing Course Malayalam | For Beginners | Online Free Course | Full Course fees

      August 23, 2025

      How I Transformed My Streaming Career in 2021

      August 21, 2025

      M. Sc in Cyber Security | Admissions Open | Indus University

      August 20, 2025
      Latest Jobs

      UI Developer

      August 25, 2025

      Highway Maintenance Worker I SEO

      August 25, 2025

      Applied Scientist, Amazon Special Projects

      August 25, 2025

      Civil Engineer- Project Manager

      August 25, 2025

      Sleep Expert- Sales

      August 25, 2025
      Legal
      • Home
      • Privacy Policy
      • Cookie Policy
      • Terms and Conditions
      • Disclaimer
      • Affiliate Disclosure
      • Amazon Affiliate Disclaimer
      Latest Udemy Coupons

      Advanced Program in Human Resources Management | Udemy Coupons 2025

      April 5, 202535 Views

      Mastering Maxon Cinema 4D 2024: Complete Tutorial Series | Udemy Coupons 2025

      August 22, 202435 Views

      Diploma in Aviation, Airlines, Air Transportation & Airports | Udemy Coupons 2025

      March 21, 202530 Views

      Time Management and Timeboxing in Business, Projects, Agile | Udemy Coupons 2025

      April 2, 202522 Views

      Python Development & Data Science: Variables and Data Types | Udemy Coupons 2025

      May 24, 202521 Views
      Blog

      How To Answer “What Makes You Unique?” In A Job Interview

      August 23, 2025

      Your Commitment to Preparation Positions You for Sustained Success

      August 15, 2025

      13 Interview Tips For Introverts To Ace Any Job Interview

      August 9, 2025

      Supplements for Busy Women That Actually Work?

      July 29, 2025

      Kick-Start Your Career This Summer: 6 Tips For Job Seekers

      July 25, 2025
      Facebook X (Twitter) Instagram Pinterest YouTube Dribbble
      © 2025 All rights reserved!

      Type above and press Enter to search. Press Esc to cancel.

      We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
      .
      SettingsAccept
      Privacy & Cookies Policy

      Privacy Overview

      This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
      Necessary
      Always Enabled
      Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
      Non-necessary
      Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
      SAVE & ACCEPT