The patches will protect users against BLASTPASS so will enabling Apple's Lockdown Mode on the device.Ĭitizen Lab found BLASTPASS on the device used by "a Washington DC-based civil society organization with international offices. "Apple is aware of a report that this issue may have been actively exploited." The report of active exploitation came from the University of Toronto's Citizen Lab, which found evidence that NSO Group’s Pegasus spyware was being installed in vulnerable devices through a zero-click exploit the Lab calls "BLASTPASS." The attacks used PassKit attachments sent as iMessage images. "A maliciously crafted attachment may result in arbitrary code execution," the company said in its advisories. The patches affect macOS Ventura 13.5.2, iOS 16.6.1 and iPadOS 16.6.1, and watchOS 9.6.2. Yesterday Apple issued three emergency patches for a vulnerability that could be exploited to install spyware. Operation KleptoCapture extends to professional service providers.The International Criminal Court will prosecute cyber war crimes.US and Ukrainian officials warn of heightened Russian offensive cyber activity.SpaceX interrupted service to block a Ukrainian attack against Russian naval units last year."Multiple nation-state actors" target the aerospace sector.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |