• Home
  • News
  • AI
  • Cyber
  • GRC
  • Blogs
  • Live CVE
No Result
View All Result
Sumtrix
  • Home
  • News
  • AI
  • Cyber
  • GRC
  • Blogs
  • Live CVE
No Result
View All Result
Sumtrix
No Result
View All Result
Home Cyber

WhatsApp Issues Emergency Update for Zero-Click Exploit Targeting iOS and macOS Devices

Jane Doe by Jane Doe
August 30, 2025
in Cyber
Share on FacebookShare on Twitter

WhatsApp has released an urgent security update for its messaging applications on Apple devices, addressing a severe “zero-click” vulnerability that security researchers believe may have been actively exploited in the wild. The flaw, identified as CVE-2025-55177, affects WhatsApp for iOS prior to version 2.25.21.73, WhatsApp Business for iOS prior to version 2.25.21.78, and WhatsApp for Mac prior to version 2.25.21.78. The company is strongly urging all users on these platforms to update their applications immediately to protect themselves from potential compromise.

The vulnerability is particularly concerning due to its “zero-click” nature. This means a threat actor could potentially compromise a user’s device without any interaction from the victim, such as clicking a malicious link or opening a file. According to the official advisory, the flaw could have allowed an “unrelated user to trigger processing of content from an arbitrary URL on a target’s device.” This type of exploit is highly sophisticated and is often associated with state-sponsored attacks or advanced spyware campaigns, as it can be used to install malware or steal sensitive data, including messages and personal files.

The new vulnerability was reportedly used in conjunction with a separate flaw in Apple’s ImageIO framework, CVE-2025-43300, which was also recently patched. Amnesty International’s Security Lab head, Donncha Ó Cearbhaill, described the combination of the two vulnerabilities as a “zero-click” attack. The incident underscores the ongoing battle between tech companies and sophisticated cyber attackers who are constantly seeking new ways to bypass even the most secure systems.

Read

Gorilla Technology Secures Major AI Government Intelligence Platform Win in Asia

CrowdStrike’s Fal.Con 2025 Event Kicks Off, Focusing on AI and Ecosystem Innovation

While WhatsApp has stated that only a limited number of individuals were likely targeted, the risk remains for any user who has not yet updated their app. The company has already notified a small number of affected individuals and recommended that they perform a full device factory reset in addition to keeping their operating systems and applications up-to-date. For optimal protection, users should update their WhatsApp app from the Apple App Store or Mac App Store and enable automatic updates to ensure that future security fixes are applied promptly. This incident serves as a crucial reminder for all digital citizens about the importance of routine software updates as a primary defense against emerging cybersecurity threats.

Previous Post

MIT study finds 95% of generative AI projects are failing: Only hype, little transformation

Next Post

U.S. and Allies Declare ‘Salt Typhoon’ Hack a National Defense Crisis

Jane Doe

Jane Doe

More Articles

Fujitsu Develops Energy-Efficient Generative AI Technology
Cyber

UN Establishes Global Dialogue on AI Governance to Address AI Risks and Oversight

In a landmark move, the United Nations has launched a new global initiative to establish an international framework for AI...

by Jane Doe
September 8, 2025
Fujitsu Develops Energy-Efficient Generative AI Technology
Cyber

EU Data Act to Become Applicable on September 12, 2025, Regulating Data Access and Sharing

The European Union's Data Act is poised to become applicable on September 12, 2025, marking a significant milestone in the...

by Jane Doe
September 8, 2025
Fujitsu Develops Energy-Efficient Generative AI Technology
Cyber

VirusTotal Finds Hidden Malware Phishing Campaign in SVG Files

In a new and concerning development, security researchers at VirusTotal have identified a sophisticated phishing campaign that uses Scalable Vector...

by Jane Doe
September 8, 2025
Fujitsu Develops Energy-Efficient Generative AI Technology
Cyber

AI-powered Malware Hits Over 2,180 GitHub Accounts in “s1ngularity” Attack

A new and insidious form of cyberattack, leveraging artificial intelligence (AI) to automate and scale malicious activities, is reportedly targeting...

by Jane Doe
September 8, 2025
Next Post
Two New UN Initiatives to Ensure Responsible AI Development

U.S. and Allies Declare 'Salt Typhoon' Hack a National Defense Crisis

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

Latest News

Hacking AI the Right Way: A Guide to AI Red Teaming

Hacking AI the Right Way: A Guide to AI Red Teaming

May 27, 2025
Researchers Cracked the Encryption Used by DarkBit Ransomware

Researchers Cracked the Encryption Used by DarkBit Ransomware

August 12, 2025
Researchers Cracked the Encryption Used by DarkBit Ransomware

High-severity WinRAR 0-day exploited for weeks by 2 groups

August 12, 2025

Transforming App Development with AI, Part 3: Challenges and Ethical Considerations

March 19, 2025
Exploring AI’s Critical Role in Climate Change at the G7 Summit

Exploring AI’s Critical Role in Climate Change at the G7 Summit

May 28, 2025
Are We Ready for the Next Cyber Storm? Why Staying Passive Is the Greatest Risk

Are We Ready for the Next Cyber Storm?

April 26, 2025
Researchers Cracked the Encryption Used by DarkBit Ransomware

Ghanaian Nationals Extradited for Roles in $100M Romance and Wire Fraud

August 12, 2025
Sumtrix.com

© 2025 Sumtrix – Your source for the latest in Cybersecurity, AI, and Tech News.

Navigate Site

  • About
  • Contact
  • Privacy Policy
  • Advertise

Follow Us

No Result
View All Result
  • Home
  • News
  • AI
  • Cyber
  • GRC
  • Blogs
  • Live CVE

© 2025 Sumtrix – Your source for the latest in Cybersecurity, AI, and Tech News.

Our website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.