WhatsApp has patched a security vulnerability in its iOS and macOS messaging clients that was exploited in targeted zero-day attacks.
WhatsApp fixes iOS/macOS security flaw
More Relevant Posts
-
A recently discovered zero-click vulnerability in WhatsApp's iOS and Mac applications has been patched. This flaw, identified as CVE-2025-55177, allowed unauthorized processing of content from arbitrary URLs without user interaction. The issue was reportedly exploited in targeted attacks against high-profile individuals, potentially compromising their devices and data. Users are strongly advised to update their WhatsApp applications to the latest versions to ensure protection against this and other security threats. https://lnkd.in/gYCBTqvz #WhatsAppSecurity #ZeroClickExploit #CyberAwareness #DeviceProtection #PrivacyFirst #DigitalSafety #UpdateNow #TechNews #SecureMessaging #StaySafeOnline #UnderstandingEnterpriseTech #EnterpriseTechnologyNow #EnterpriseTechnologyToday
To view or add a comment, sign in
-
WhatsApp has patched a serious security vulnerability that was being used in zero-click attacks targeting Apple devices. Experts say that fewer than 200 users were targeted during a 90-day campaign. The flaw chained with an iOS operating system vulnerability to allow malicious operations without user interaction. All users are urged to update their apps and devices to the latest versions to stay protected. https://lnkd.in/gar36hEw #WhatsAppSecurity #ZeroClickBug #CyberSafety #DigitalSecurity #TechUpdate #PrivacyProtection #MobileSecurity #InfoSec #VulnerabilityPatch #StaySafeOnline #UnderstandingEnterpriseTech #EnterpriseTechnologyNow #EnterpriseTechnologyToday
To view or add a comment, sign in
-
https://lnkd.in/dTPStYCs 🍏iOS 26 Update Wipes Traces of Spyware Attacks 🥷❗️Accident or Intent? According to a new report by iVerify, the release of iOS 26 has created a major obstacle for 👍mobile digital forensics. With iOS 26, the operating system began overwriting the shutdown.log file on every reboot instead of appending new entries. 😅 In practice, Apple is depriving 💻researchers and users of the ability to detect traces of sophisticated spyware such as Pegasus and Predator, which heavily relied on this log file during their operations. 🤬Whether this change was an unintended mistake or a deliberate move, Apple’s decision sets a ↔️dangerous precedent at a time when spyware attacks on high-profile individuals and journalists are on the rise worldwide. For several years, the shutdown.log file has been a battleground between malware developers and digital forensic specialists. Analysis by iVerify shows that back in 2021, Pegasus left traces in this file — and by 2022, it had evolved to completely erase it. The mere fact of the log being wiped was itself an indicator of compromise. Later, the Predator spyware reportedly adopted a similar tactic to conceal its activity. Notably, this “new feature” arrives at a highly inconvenient time — as threats become increasingly sophisticated, Apple’s changes make forensic analysis even more difficult. 🤔 What’s the real reason behind it? One can only guess. There’s little good to be said about this… 👆iVerify urges users to save a sysdiagnose diagnostic report before updating to iOS 26 to preserve potential digital evidence of compromise. It’s also wise to delay the update until Apple addresses the issue — ideally by releasing 📖a patch that prevents the shutdown.log file from being overwritten during reboots. #iOS26 #Apple #iVerify #Pegasus #Predator #Spyware #Cybersecurity #DigitalForensics #MalwareAnalysis #iPhoneSecurity #Privacy #ThreatIntelligence #IncidentResponse #ZeroDay #MobileSecurity #Forensics #SecurityUpdate #CyberThreats #spyware #iOS #apple
To view or add a comment, sign in
-
🚨 CYBERSECURITY ALERT: WhatsApp Zero-Click Vulnerability 📱 A critical security vulnerability CVE-2025-55177, CVE-2025-43300 has been identified and exploited in WhatsApp on Apple devices (iOS, macOS, iPadOS), allowing attackers to take control of your device without any action from you. This is the definition of a "Zero-Click Remote Code Execution (RCE)" attack, and it poses an immediate and severe risk. What is the Danger? ⚠️ Silent Takeover: Attackers can compromise your device simply by sending a malicious DNG (image) file to your WhatsApp number. Crucially, you do not need to click, open, or even interact with the message—the exploit is triggered automatically upon receipt. Total Control: Successful exploitation grants the attacker complete, silent control over the affected device, allowing for data theft, surveillance, and further malware deployment. 🕵️ This attack highlights the fundamental dangers lurking in file-parsing libraries and communication protocols. 🛡️ Immediate Action Required: Update Everything: Immediately check for and install the latest security patches for your WhatsApp application, as well as your device's iOS, iPadOS, or macOS operating system. Patches are the only known defense against this specific flaw. ⏫ Stay vigilant and prioritize your software updates today. Your security is not worth the delay. #CyberSecurity #InfoSec #WhatsApp #ZeroClick #Vulnerability #TechNews
To view or add a comment, sign in
-
-
🚨 Security Alert: CVE-2025-55177 (WhatsApp — iOS / macOS) 🚨 A newly patched vulnerability (CVE-2025-55177) in WhatsApp’s iOS and Mac clients could allow an unrelated user to trigger processing of content from an arbitrary URL on a target device — and was reportedly chained with an Apple OS zero-day in targeted, zero-click spyware campaigns. If you or your org use WhatsApp on Apple devices, update immediately to the patched versions. 🛠️🔒 Why it matters: • Zero-click = no user interaction required. • Used in highly targeted attacks against specific individuals. • Keeping apps & OS up to date is your first and best defense. 🔁✅ #cybersecurity #infosec #vulnerability #WhatsApp #patchnow
To view or add a comment, sign in
-
-
A "zero-click” WhatsApp vulnerability (CVE-2025-55177) was exploited in targeted attacks and has been patched. Researchers and WhatsApp say it was used in highly targeted spyware campaigns (dozens — under 200 — of victims), mostly against specific high-value targets on Apple devices. What happened (concise timeline & technical gist) WhatsApp discovered a flaw in its linked-device synchronization handling (CVE-2025-55177) that could allow an attacker to cause the app to fetch/process remote content without any user interaction — i.e., a zero-click attack. WhatsApp patched it in late August 2025. Evidence indicates attackers chained that WhatsApp flaw with an Apple OS zero-day (CVE-2025-43300) to deliver spyware to specific iOS/macOS users. The campaign was targeted and stealthy (few victims). #whatsapp #vulnerability #cybersecurity
To view or add a comment, sign in
-
-
Apple Security Alert: Critical FontParser Vulnerability Patched Apple has issued a vital security update addressing CVE-2025-43400—a serious flaw in FontParser affecting macOS, iOS, and iPadOS. This vulnerability could allow attackers to exploit malicious fonts, potentially leading to app crashes or arbitrary code execution. Though not currently known to be exploited, similar bugs have powered jailbreaks and spyware in the past. If you’re running Apple devices, update now to stay protected. Stay safe my friends and be aware. #CyberSecurity #AppleUpdate #InfoSec #PatchNow #CVE202543400
To view or add a comment, sign in
-
Rewterz Insights: WhatsApp Flaw Lets Malicious DNG Execute Code Remotely A zero-click vulnerability in WhatsApp on iOS, macOS, and iPadOS (CVE-2025-55177 & CVE-2025-43300) allows attackers to execute arbitrary code via a malicious DNG image, no user interaction required. Exploitation can give full device control, access to sensitive data, and enable further malware deployment silently. Is your WhatsApp environment secure against zero-click attacks? Stay updated and mitigate risks now: https://lnkd.in/ezeS47XT #cybersecurity #infosec #dataprivacy #mobilesecurity #threatintelligence #rewterz #ksa #vision2030
To view or add a comment, sign in
-
-
🚨 iOS 26 Update Wipes Spyware Evidence ~ Flaw or Feature? According to a new report by iVerify, Apple’s iOS 26 introduces a change that overwrites the shutdown.log file with every reboot, instead of appending to it. This seemingly small update poses a major setback for digital forensics and threat detection. Why does it matter? 🔍 For years, advanced spyware like Pegasus and Predator left traces in shutdown.log. Analysts used it to investigate infections and trace attacks on journalists, officials, and high-profile targets. In 2021, Pegasus left traces in the log. By 2022, it had evolved to wipe the log altogether. Even that deletion became a forensic red flag. Now, iOS 26 does the wiping by default — removing one of the last reliable breadcrumbs for forensic experts. 😬 Whether this was an unintentional mistake or something more strategic is unclear — but the timing couldn’t be worse, as spyware threats grow more advanced and more politically sensitive. 🛑 iVerify urges users to save a sysdiagnose report before updating to iOS 26, in case forensic analysis is needed. ⏳ And if you’re in a high-risk category — you might want to delay updating until Apple addresses this. Thoughts? Is this a design flaw… or a design choice? ;) The LinkedIn app on my iphone shut off spontaneously when I was trying to link a photo to post this - just reporting, Apple, you know I 💓you ;) #iOS26 #Cybersecurity #DigitalForensics #Spyware #Pegasus #Predator #Infosec #AppleSecurity #Privacy #MobileThreats #AIForHumans #SecurityForHumans
To view or add a comment, sign in
-
-
URGENT: Patch Now — CVE-2025-55177 (WhatsApp linked-device sync) A serious authorization flaw in WhatsApp’s linked-device sync can let an attacker cause a device to fetch and process content from arbitrary urls. This is a zero-click risk when chained with other OS issues , meaning targets can be compromised without interacting. If you use WhatsApp on iOS or Mac , update it immediately to the vendor-patched versions. Don’t ignore “minor” updates; threat actors weaponize small gaps fast. Actions: • Update WhatsApp and OS now. • Remove unknown linked devices. • Rotate credentials and monitor unusual behavior. • Follow vendor advisories and CISA/industry alerts. Security is only as strong as its weakest patch. Stay protected🔒 #Infosec #Cybersecurity #CVE #PatchNow #ThreatIntel #ZeroClick #SNSInstitutions #HackForGood
To view or add a comment, sign in
-