Apple releases software updates and uses the company's mobile software. The company said it had been actively used to buy customers to buy customers.
Apple approves due to its website on security tips Two zero -day weaknessesIt can be exploited in a very sophisticated attack to meet specific targets in iOS.
The bugs are considered Zero Because they did not know Apple as they were cut off.
No one behind the attack or is unknown how Apple clients targeted. A spokeswoman for Apple did not return to TechCrunch's investigation.
Apple recognized one of the two security researchers working in Google's Analysis Group. It indicates that targeted attacks on Apple users introduce or coordinating or coordination by an international or government agency. Some government-backed cyber attacks are known Using Spyware Stuffs versus Other phone players.
A spokesman for Google spokesman did not comment immediately when it arrived at TechCrunch.
Apple Apple's Core Audio, Apple's main voice, Apple's main voice, using a variety of products. Using the app. Apple uses a variety of products. Is used. Apple says it can be used by an extraction by Audio Stream in Medicious Media File that can allow a bug The execution of a dangerous code On an apple machine affected.
Apple allows the attacker to avoid pointer authentication to an attacker to an attacker Apple uses its software To make it harder to be more difficult for the attackers to beat harmful codes into the device's memory.
Apple has published a Software update for MacOS SequoiaThe software version is bumping 15.4.1 and prepares security bugs on iOS 18.4.1 in iPhone and iPads. Apple TV And the company's mix-real headset Vision Pro Also obtained the same security updates.