Close Menu
    Main Menu
    • Home
    • News
    • Tech
    • Robotics
    • ML & Research
    • AI
    • Digital Transformation
    • AI Ethics & Regulation
    • Thought Leadership in AI

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Malicious Perplexity Comet Browser Obtain Adverts Push Malware By way of Google – Hackread – Cybersecurity Information, Information Breaches, Tech, AI, Crypto and Extra

    October 18, 2025

    How Enterprises Ought to Harden Blockchain Apps in Cloud

    October 18, 2025

    Switchboard-Have an effect on: Emotion Notion Labels from Conversational Speech

    October 18, 2025
    Facebook X (Twitter) Instagram
    UK Tech InsiderUK Tech Insider
    Facebook X (Twitter) Instagram
    UK Tech InsiderUK Tech Insider
    Home»AI Ethics & Regulation»Hackers May Take Over Apple Gadgets Through Malicious Photographs – Patch Now!
    AI Ethics & Regulation

    Hackers May Take Over Apple Gadgets Through Malicious Photographs – Patch Now!

    Declan MurphyBy Declan MurphyAugust 24, 2025No Comments2 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    Hackers May Take Over Apple Gadgets Through Malicious Photographs – Patch Now!
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link


    Apple fixes CVE-2025-43300, a flaw letting hackers hijack units by way of malicious photos. Customers urged to replace iPhone, iPad, and Mac now.

    A number of cybersecurity researchers lately warned {that a} vital vulnerability (CVE‑2025‑43300) in Apple’s picture‑processing framework was being abused by attackers. Apple has now launched updates throughout iPhone, iPad and Mac units to handle the problem.

    Safety researcher Pablo Sabbatella famous that the flaw concerned picture file dealing with in Apple’s methods. One other alert got here from a separate safety advisor, highlighting the menace posed by the zero‑day. This subject has since acquired pressing consideration.

    Safety researcher Vladimir S. (recognized on X as Officer’s Notes) warned that CVE‑2025‑43300 was underneath energetic exploitation, noting that merely opening a maliciously crafted picture was sufficient for an attacker to remotely take management of a tool.

    Pressing! Simply by receiving a picture in your iPhone or Mac, your machine could be FULLY compromised. Replace your units ASAP!

    Additionally beneficial:

    • Disable auto obtain of photos in Telegram;
    • Disable the auto obtain of photos in WhatsApp;
    • Disable iMessage for full or,…

    — Vladimir S. | Officer’s Notes (@officer_cia) August 22, 2025

    Apple confirmed that the vulnerability, a reminiscence‑corruption flaw attributable to an out‑of‑bounds write within the Picture IO framework, had been discovered internally and glued utilizing improved boundary checks.

    The corporate launched safety updates on August 20, 2025. Variations affected and now mounted embody:

    • iPadOS 17.7.10
    • macOS Sequoia 15.6.1
    • macOS Ventura 13.7.8
    • macOS Sonoma 14.7.8
    • iOS 18.6.2 and iPadOS 18.6.2

    Affected units embody iPhone XS and newer fashions, varied iPad and iPad Professional generations, and Mac methods working the listed macOS variations.

    This flaw has now been added to the US CISA’s (Cybersecurity and Infrastructure Safety Company) Identified Exploited Vulnerabilities Catalog, with organizations suggested to use fixes by September 11, 2025.

    That is already the seventh zero-day Apple has needed to repair this yr, following 5 comparable urgently patched flaws, plus a more moderen one within the Safari browser. Subsequently, in case you are an Apple person following these steps to safe your units:

    • Replace your machine straight away by way of Settings → Common → Software program Replace on iOS/iPadOS, or System Settings → Software program Replace on macOS.



    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Declan Murphy
    • Website

    Related Posts

    Malicious Perplexity Comet Browser Obtain Adverts Push Malware By way of Google – Hackread – Cybersecurity Information, Information Breaches, Tech, AI, Crypto and Extra

    October 18, 2025

    North Korean Hackers Mix BeaverTail and OtterCookie into Superior JS Malware

    October 17, 2025

    Attackers Exploit Zendesk Authentication Challenge to Flood Targets’ Inboxes with Company Notifications

    October 17, 2025
    Top Posts

    Malicious Perplexity Comet Browser Obtain Adverts Push Malware By way of Google – Hackread – Cybersecurity Information, Information Breaches, Tech, AI, Crypto and Extra

    October 18, 2025

    Evaluating the Finest AI Video Mills for Social Media

    April 18, 2025

    Utilizing AI To Repair The Innovation Drawback: The Three Step Resolution

    April 18, 2025

    Midjourney V7: Quicker, smarter, extra reasonable

    April 18, 2025
    Don't Miss

    Malicious Perplexity Comet Browser Obtain Adverts Push Malware By way of Google – Hackread – Cybersecurity Information, Information Breaches, Tech, AI, Crypto and Extra

    By Declan MurphyOctober 18, 2025

    A brand new malvertising marketing campaign is benefiting from the recognition of Perplexity’s just lately…

    How Enterprises Ought to Harden Blockchain Apps in Cloud

    October 18, 2025

    Switchboard-Have an effect on: Emotion Notion Labels from Conversational Speech

    October 18, 2025

    Flexiv Forecasts the Way forward for Robotics at IROS 2025

    October 18, 2025
    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    UK Tech Insider
    Facebook X (Twitter) Instagram
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms Of Service
    • Our Authors
    © 2025 UK Tech Insider. All rights reserved by UK Tech Insider.

    Type above and press Enter to search. Press Esc to cancel.