Published on May 15, 2025. EST READ TIME: 2 minutes
Cybersecurity firm Oligo has identified a series of critical vulnerabilities in Apple’s AirPlay protocol, collectively named “AirBorne.” These flaws enable attackers on the same Wi-Fi network to perform zero-click remote code execution (RCE) attacks, potentially taking control of AirPlay-enabled devices without any user interaction. The vulnerabilities affect a wide range of devices, including iPhones, iPads, Macs, and third-party products like smart TVs and speakers. Notably, some of these flaws are “wormable,” meaning they can propagate malware across devices on the same network. Apple has released patches addressing these issues in updates for iOS 18.4, macOS Sequoia 15.4, and other platforms. However, many third-party devices remain vulnerable due to delayed or absent updates. Users are advised to update their devices promptly, disable AirPlay when not in use, and restrict AirPlay access to trusted networks to mitigate potential risks.
North Korea's Lazarus Group Rakes in $3 Million: Unveiling Cybercrime's Financial Motivations
Read More 2 min read
Security Vulnerability: Windows Hello Fingerprint Authentication Bypassed on Popular Laptops
Read More 2 min read
Indian Startup Hack-for-Hire: Navigating the Complexities of Ethical Hacking
Read More 2 min read
North Korean Hackers Pose as Job Recruiters in Cyber Espionage Campaign
Read More 2 min read
Analysis Reveals: Bad Bots Constitute a Staggering 73% of Internet Traffic
Read More 2 min read
Menu