{"id":103411,"date":"2025-03-12T07:24:42","date_gmt":"2025-03-12T14:24:42","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=103411"},"modified":"2025-03-13T14:04:33","modified_gmt":"2025-03-13T21:04:33","slug":"apple-and-google-patch-zero-day-vulnerability-used-to-hack-iphones","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/apple-and-google-patch-zero-day-vulnerability-used-to-hack-iphones\/","title":{"rendered":"Apple and Google patch zero-day vulnerability used to hack iPhones"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-103406\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2025\/03\/Safari-and-Chromium-based-browsers-Chrome-Edge-Brave-Opera-Vivaldi-logos-600x300-1.jpg\" alt=\"macOS browser app icons of Apple Safari and Chromium-based browsers Google Chrome, Microsoft Edge, and Brave\" width=\"600\" height=\"300\" \/><\/p>\n<p>On Tuesday, March 11, Apple released security updates for several of its operating systems: iOS, iPadOS, macOS, and visionOS. The updates address a single &#8220;exploited&#8221; (i.e. in-the-wild, or zero-day) vulnerability\u2014the third that Apple has patched in 2025. According to Apple, <strong>hackers had used the flaw in &#8220;an extremely sophisticated attack&#8221; against iPhones around late 2023.<\/strong><\/p>\n<p>One day earlier, Google released an update for its Chrome browser for Mac, Windows, and Linux addressing the same vulnerability. Other Chromium-based browsers and apps have begun rolling out corresponding updates.<\/p>\n<p>Here&#8217;s everything you need to know about these critical security fixes.<\/p>\n<p><em>In this article:<\/em><\/p>\n<ul>\n<li><a href=\"#cve\">What Apple and Google revealed about CVE-2025-24201<\/a><\/li>\n<li><a href=\"#2023\">Why did Apple patch a 2023 vulnerability in 2025?<\/a><\/li>\n<li><a href=\"#notpatched\">What about tvOS, watchOS, and iPadOS 17?<\/a><\/li>\n<li><a href=\"#howinstall\">How to install Apple security updates<\/a><\/li>\n<li><a href=\"#chromium\">More details about the Chromium updates<\/a><\/li>\n<li><a href=\"#desktop\">How to update Chromium-based desktop browsers<\/a><\/li>\n<li><a href=\"#mobile\">Updating Chromium-based mobile browsers<\/a><\/li>\n<li><a href=\"#nonb\">Non-browser apps need updates, too<\/a><a name=\"cve\"><\/a><\/li>\n<\/ul>\n<h3>What Apple and Google revealed about CVE-2025-24201<\/h3>\n<p>Apple released the following updates on Tuesday to address the single security flaw:<\/p>\n<ul>\n<li>macOS Sequoia 15.3.2<\/li>\n<li>iOS 18.3.2 and iPadOS 18.3.2<\/li>\n<li>visionOS 2.3.2<\/li>\n<li>Safari 18.3.1 for macOS Sonoma and Ventura<\/li>\n<\/ul>\n<p>Following are the <a href=\"https:\/\/support.apple.com\/en-us\/122281\" target=\"_blank\" rel=\"noopener\">details<\/a> that Apple provided about this vulnerability on Tuesday:<\/p>\n<blockquote>\n<p class=\"gb-header\"><strong>WebKit<\/strong><br \/>\nImpact: Maliciously crafted web content may be able to break out of Web Content sandbox. This is a supplementary fix for an attack that was blocked in iOS 17.2. <strong><span style=\"color: #ff0000;\">(Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on versions of iOS before iOS 17.2.)<\/span><\/strong><br \/>\nDescription: An out-of-bounds write issue was addressed with improved checks to prevent unauthorized actions.<br \/>\nCVE-2025-24201: Apple<\/p>\n<\/blockquote>\n<p>Google provided a few additional details in its <a href=\"https:\/\/chromereleases.googleblog.com\/2025\/03\/stable-channel-update-for-desktop_10.html\" target=\"_blank\" rel=\"noopener\">release notes<\/a> on Monday:<\/p>\n<blockquote>\n<p class=\"gb-header\"><strong>High<\/strong> CVE-2025-24201: Out of bounds write in GPU on Mac. Reported by Apple Security Engineering and Architecture (SEAR) on 2025-03-05 \u2026 <strong><span style=\"color: #ff0000;\">Google is aware of reports that an exploit for CVE-2025-24201 exists in the wild.<\/span><\/strong><br \/>\nDescription: An out-of-bounds write issue was addressed with improved checks to prevent unauthorized actions.<br \/>\nChromium issue number: <a href=\"https:\/\/issues.chromium.org\/issues\/401059730\" target=\"_blank\" rel=\"noopener\">401059730<\/a><a name=\"2023\"><\/a><\/p>\n<\/blockquote>\n<h3>Why did Apple patch a 2023 vulnerability in 2025?<\/h3>\n<p>Notably, Apple points out that the flaw was exploited &#8220;before iOS 17.2.&#8221; Apple released that iOS update on December 11, 2023\u2014well over a year ago.<\/p>\n<p>It&#8217;s interesting to note that Apple&#8217;s OS releases from late January 2025 (iOS 18.3, macOS Sequoia 15.3, etc.) <a href=\"https:\/\/www.intego.com\/mac-security-blog\/ios-18-3-and-macos-sequoia-15-3-patch-first-apple-zero-day-of-2025\/\">also addressed a security vulnerability<\/a> (CVE-2025-24085) that &#8220;may have been actively exploited against versions of iOS before iOS 17.2.&#8221; Apple technically did not credit any particular researcher for that flaw, but also did not state that the vulnerability was reported anonymously; thus it appears that Apple discovered and patched both of these flaws more than a year after they were first exploited.<\/p>\n<p>Perhaps an internal team at Apple has been spending time reverse engineering past nation-state level attack chains, in an effort to further harden its operating systems against similar attacks.<a name=\"other\"><\/a><a name=\"notpatched\"><\/a><\/p>\n<h3>What about tvOS, watchOS, and iPadOS 17?<\/h3>\n<p>Apple released one other operating system update on Tuesday: tvOS 18.3.1. The update only applies to one specific model of Apple TV, as detailed below.<\/p>\n<p>According to the <a href=\"https:\/\/support.apple.com\/en-us\/100100\" target=\"_blank\" rel=\"noopener\">Apple security releases<\/a> page, tvOS 18.3.1 &#8220;has no published CVE entries.&#8221; This indicates that the WebKit vulnerability was not patched in this update, for whatever reason.<\/p>\n<p>On Apple&#8217;s <a href=\"https:\/\/support.apple.com\/en-us\/106336\" target=\"_blank\" rel=\"noopener\">About Apple TV 4K and Apple TV HD software updates<\/a> page, the company explains what the update includes:<\/p>\n<blockquote><p>This update addresses an issue that may prevent playback of some streaming content on Apple TV 4K (3rd generation).<\/p><\/blockquote>\n<p>Normally, Apple updates HomePod Software (sometimes called audioOS) along with tvOS, but that <a href=\"https:\/\/mrmacintosh.com\/macos-sequoia-15-3-2-update-everything-you-need-to-know\/\" target=\"_blank\" rel=\"noopener\">wasn&#8217;t the case<\/a> this week.<\/p>\n<p>Apple has not released any watchOS updates this week, either. Although WebKit is an underlying technology in all of Apple&#8217;s operating systems, it&#8217;s unclear whether CVE-2025-24201 may be exploitable on watchOS or tvOS.<\/p>\n<p>Notably, Apple chose not to patch CVE-2025-24201 for iPadOS 17 this week\u2014even though the flaw clearly affects that OS. Until now, Apple has been releasing partial security patches for the previous iPad operating system, specifically for devices that are incompatible with iPadOS 18.<a name=\"howinstall\"><\/a><\/p>\n<h3>How to install Apple security updates<\/h3>\n<h4><strong>For macOS updates<\/strong><\/h4>\n<p><strong>If you haven&#8217;t yet upgraded to macOS Sequoia<\/strong>, be sure to first update your critical software. For example, run Intego&#8217;s NetUpdate utility and install all available updates, and then check for updates for all other software that you use regularly. Next, check for macOS updates by going to <strong>System Settings<\/strong> &gt; <strong>General<\/strong> &gt; <strong>Software Update<\/strong>.<\/p>\n<p>If you have any trouble getting the macOS update to show up, either press \u2318R at the Software Update screen, or type in the Terminal <code>softwareupdate -l<\/code> (that\u2019s a lowercase L) and press Return\/Enter, then check System Settings &gt; General &gt; Software Update again.<\/p>\n<p>Note that <strong>Apple only ever fully patches the latest macOS version (currently, that&#8217;s macOS Sequoia)<\/strong>; older macOS versions only get a subset of those patches and remain vulnerable. Therefore, staying on the latest macOS version is critically important for maintaining your security and privacy. For more information, see our article, &#8220;<a href=\"https:\/\/www.intego.com\/mac-security-blog\/when-does-an-old-mac-become-unsafe-to-use\/\">When does an old Mac become unsafe to use?<\/a>&#8221;<\/p>\n<p>&nbsp;<\/p>\n<h4><strong>For other Apple OS updates<\/strong><\/h4>\n<p>Users of <strong>iPhone or iPad<\/strong> can open the <strong>Settings app<\/strong> and choose <strong>General<\/strong> &gt; <strong>Software Update<\/strong> to update iOS or iPadOS on their devices. (This is an &#8220;over the air&#8221; or OTA update.) Alternatively, you can connect your device to your Mac, click on the device name in a Finder window sidebar, and check for updates there; or, if you use a Windows PC, you can use the <a href=\"https:\/\/apps.microsoft.com\/detail\/9np83lwlpz9k?hl=en-us&amp;gl=US\" target=\"_blank\" rel=\"noopener\">Apple Devices app<\/a>.<\/p>\n<p>Similarly, users of <strong>Apple Vision Pro<\/strong>\u00a0can open the <strong>Settings app<\/strong> and choose <strong>General<\/strong> &gt; <strong>Software Update<\/strong> to update visionOS.<\/p>\n<p>To update <strong>tvOS on your Apple TV<\/strong>, open the Settings app and choose <strong>System<\/strong> &gt; <strong>Software Updates<\/strong>.<\/p>\n<p>&nbsp;<\/p>\n<h4><strong>It&#8217;s wise to back up before updating<\/strong><\/h4>\n<p>Whenever you&#8217;re preparing to update macOS, iOS, or iPadOS, it&#8217;s a good idea to always <strong>back up your data<\/strong> before installing any updates. This gives you a restore point if something does not go as planned. See our related article on <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-verify-your-backups-are-working-properly\/\">how to check your macOS backups to ensure they work correctly<\/a>.<\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"6jOYDsZxPb\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-verify-your-backups-are-working-properly\/\">How to Verify Your Backups are Working Properly<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;How to Verify Your Backups are Working Properly&#8221; &#8212; The Mac Security Blog\" src=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-verify-your-backups-are-working-properly\/embed\/#?secret=6jOYDsZxPb\" data-secret=\"6jOYDsZxPb\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>See also our article on <a href=\"https:\/\/www.intego.com\/mac-security-blog\/should-you-back-up-your-ios-device-to-icloud-or-itunes\/\">how to back up your iPhone or iPad to iCloud and to your Mac<\/a>.<a name=\"chromium\"><\/a><\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"1MS1ostpDE\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/should-you-back-up-your-ios-device-to-icloud-or-itunes\/\">Should you back up your iPhone to iCloud or your Mac? Here&#8217;s how to do both<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Should you back up your iPhone to iCloud or your Mac? Here&#8217;s how to do both&#8221; &#8212; The Mac Security Blog\" src=\"https:\/\/www.intego.com\/mac-security-blog\/should-you-back-up-your-ios-device-to-icloud-or-itunes\/embed\/#?secret=1MS1ostpDE\" data-secret=\"1MS1ostpDE\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<h3>More details about the Chromium updates<\/h3>\n<p>Monday&#8217;s Google Chrome browser update to version 134.0.6998.88\/.89 contains <a href=\"https:\/\/chromereleases.googleblog.com\/2025\/03\/stable-channel-update-for-desktop_10.html\" target=\"_blank\" rel=\"noopener\">four other patches<\/a> besides the one Apple reported.<\/p>\n<p>Whenever Chrome gets a security update, other browsers based on the <a href=\"https:\/\/www.chromium.org\/Home\/\" target=\"_blank\" rel=\"noopener\">Chromium<\/a> open-source Web browser project generally require an update, too. Notable browsers built upon the Chromium codebase include\u00a0<b>Microsoft<\/b>\u00a0<strong>Edge<\/strong>, <strong>Arc<\/strong>, <strong>Brave<\/strong>, <strong>Vivaldi<\/strong>, and <strong>Opera<\/strong> (along with its variants, <strong>Opera GX<\/strong> and <strong>Opera Air<\/strong>).<\/p>\n<p><a href=\"https:\/\/vivaldi.com\/blog\/desktop\/minor-update-seven-7-1\/\" target=\"_blank\" rel=\"noopener\">Vivaldi got an update<\/a> on Monday, and <a href=\"https:\/\/brave.com\/latest\/\" target=\"_blank\" rel=\"noopener\">Brave got an update<\/a> on Tuesday, to patch CVE-2025-24201; Brave&#8217;s update also patches the other four flaws. So far, as of when this blog post is being published, Arc,\u00a0Microsoft Edge, and Opera&#8217;s various browsers haven&#8217;t been patched yet.<a name=\"desktop\"><\/a><\/p>\n<h3>How to update Chromium-based desktop browsers<\/h3>\n<p><strong>Mac users can update their Chrome, Brave, Edge, or Opera browsers<\/strong> by clicking on the application menu (e.g. &#8220;Chrome&#8221; or &#8220;Microsoft Edge,&#8221; next to the Apple logo menu), and then clicking the first item in that menu (e.g. &#8220;About Google Chrome&#8221; or &#8220;About Microsoft Edge&#8221;). The browser will check for updates; if an update is available, it will prompt you to restart the app to complete the update.<\/p>\n<p><strong>Arc and Vivaldi for macOS<\/strong> have a slightly different update procedure. After clicking on the Arc or Vivaldi menu (next to the Apple menu), click on &#8220;Check for Updates\u2026&#8221; to ensure you have the latest version installed.<\/p>\n<p><strong>Windows users can update their browsers<\/strong> by following the steps provided by each browser maker: <a href=\"https:\/\/support.google.com\/chrome\/answer\/95414?co=GENIE.Platform%3DDesktop&amp;oco=1\" target=\"_blank\" rel=\"noopener\">Chrome<\/a>, <a href=\"https:\/\/resources.arc.net\/hc\/en-us\/articles\/21489650267031-Update-Arc-Browser\" target=\"_blank\" rel=\"noopener\">Arc<\/a>, <a href=\"https:\/\/community.brave.com\/t\/how-to-update-brave\/384780\" target=\"_blank\" rel=\"noopener\">Brave<\/a>, <a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/microsoft-edge-update-settings-af8aaca2-1b69-4870-94fe-18822dbb7ef1\" target=\"_blank\" rel=\"noopener\">Edge<\/a>, <a href=\"https:\/\/help.opera.com\/en\/latest\/crashes-and-issues\/#updateBrowser\" target=\"_blank\" rel=\"noopener\">Opera<\/a>, <a href=\"https:\/\/help.vivaldi.com\/desktop\/install-update\/update-vivaldi\/\" target=\"_blank\" rel=\"noopener\">Vivaldi<\/a>.<a name=\"mobile\"><\/a><\/p>\n<h3>How to update Chromium-based mobile browsers<\/h3>\n<p><strong>Android users<\/strong> should check the Google Play Store app for the latest versions of their browsers and other apps.<\/p>\n<p>Mobile browsers on <strong>iOS and iPadOS<\/strong> use Safari&#8217;s WebKit engine, rather than Chromium&#8217;s Blink and V8 engines. Therefore, this particular vulnerability does not affect the iOS or iPadOS versions of any Web browsers. If you would like to update your iPhone and iPad browsers anyway, you can do so via the App Store. (Here&#8217;s <a href=\"https:\/\/support.apple.com\/en-us\/HT202180\" target=\"_blank\" rel=\"noopener\">how to manually check for and install updates<\/a>.)<\/p>\n<p>Starting with iOS 17.4, browser makers may opt into using their own rendering engines. However, this is only available in the EU, for compliance with the Digital Markets Act. No major third-party browser has chosen to bring its own engine to iOS yet.<a name=\"nonb\"><\/a><\/p>\n<h3>Non-browser apps need updates, too<\/h3>\n<p>As we&#8217;ve noted in the past, many non-browser apps, including\u00a0<a href=\"https:\/\/www.intego.com\/mac-security-blog\/chromium-vulnerabilities-threaten-electron-app-security\/\">Electron apps<\/a>, also rely on the Chromium browser codebase for rendering HTML content. These include the desktop versions of apps like <strong>1Password, Discord, Dropbox, Figma, GitHub, Microsoft Teams, Signal, Skype, Slack, Trello, Twitch, WhatsApp, WordPress, and Zoom.<\/strong><\/p>\n<p>Notably, the Electron framework does not get updated in tandem with Chromium, so some <a href=\"https:\/\/www.intego.com\/mac-security-blog\/chromium-vulnerabilities-threaten-electron-app-security\/#0ce\">Electron-based apps may remain vulnerable for months<\/a>. For this and other reasons, it&#8217;s important to keep all your other apps updated as well.<\/p>\n<p>To <a href=\"https:\/\/support.apple.com\/en-us\/HT202180#macos\" target=\"_blank\" rel=\"noopener nofollow\">update Mac App Store apps<\/a>, open the App Store, then click Updates, and click on Update All. Other apps usually have their own separate in-app or external update mechanisms. In some cases, you may need to update an app manually by downloading a new version from the developer&#8217;s site.<\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"YwCUWTKAtN\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/chromium-vulnerabilities-threaten-electron-app-security\/\">Chromium vulnerabilities threaten Electron app security<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Chromium vulnerabilities threaten Electron app security&#8221; &#8212; The Mac Security Blog\" src=\"https:\/\/www.intego.com\/mac-security-blog\/chromium-vulnerabilities-threaten-electron-app-security\/embed\/#?secret=YwCUWTKAtN\" data-secret=\"YwCUWTKAtN\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p><a name=\"learnmore\"><\/a><\/p>\n<h3>How can I learn more?<\/h3>\n<p><a href=\"https:\/\/podcast.intego.com\/\" target=\"_blank\" rel=\"noopener\"><img class=\"alignleft\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/intego-podcast-artwork-400.jpg\" alt=\"\" width=\"80\" \/><\/a>Each week on the <a href=\"https:\/\/podcast.intego.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Intego Mac Podcast<\/strong><\/a>, Intego&#8217;s Mac security experts discuss the latest Apple news, including security and privacy stories, and offer practical advice on getting the most out of your Apple devices. Be sure to <a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" rel=\"noopener\"><strong>follow the podcast<\/strong><\/a> to make sure you don\u2019t miss any episodes.<\/p>\n<p>You can also subscribe to our <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-security-newsletter\/\"><strong>e-mail newsletter<\/strong><\/a> and keep an eye here on <a href=\"https:\/\/www.intego.com\/mac-security-blog\"><strong>The Mac Security Blog<\/strong><\/a> for the latest Apple security and privacy news. And don&#8217;t forget to follow Intego on your favorite social media channels: <a href=\"https:\/\/x.com\/IntegoSecurity\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on \ud835\udd4f\/Twitter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/X-Twitter-logo-icon-225.gif\" alt=\"Follow Intego on X\/Twitter\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.facebook.com\/Intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Facebook\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Facebook-logo-icon-225.gif\" alt=\"Follow Intego on Facebook\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.youtube.com\/user\/IntegoVideo?sub_confirmation=1\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on YouTube\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/YouTube-logo-icon-225.png\" alt=\"Follow Intego on YouTube\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.linkedin.com\/company\/intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on LinkedIn\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/LinkedIn-logo-icon-225.gif\" alt=\"Follow Intego on LinkedIn\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.pinterest.com\/intego\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on Pinterest\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Pinterest-logo-icon-225.png\" alt=\"Follow Intego on Pinterest\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.instagram.com\/intego_security\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Instagram\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Instagram-logo-icon-225.gif\" alt=\"Follow Intego on Instagram\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow the Intego Mac Podcast on Apple Podcasts\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile.png\" alt=\"Follow the Intego Mac Podcast on Apple Podcasts\" width=\"16\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Apple has patched its third zero-day security vulnerability of 2025\u2014and Google also patched the same flaw. Here is everything you need to know to keep your Mac, iPhone, iPad, and Vision Pro safe.<\/p>\n","protected":false},"author":14,"featured_media":103407,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[11],"tags":[4736,4543,38,173,4682,181,69,4741,4564,4742,3175,4740,4686,4643,4607,93,115,201,4680],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Apple has patched its third zero-day security vulnerability of 2025\u2014and Google also patched the same flaw. Here is everything you need to know to keep your Mac, iPhone, iPad, and Vision Pro safe.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-and-google-patch-zero-day-vulnerability-used-to-hack-iphones\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Apple and Google patch zero-day vulnerability used to hack iPhones - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Apple has patched its third zero-day security vulnerability of 2025\u2014and Google also patched the same flaw. Here is everything you need to know to keep your Mac, iPhone, iPad, and Vision Pro safe.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/apple-and-google-patch-zero-day-vulnerability-used-to-hack-iphones\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/JoshLong\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-12T14:24:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-13T21:04:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2025\/03\/Safari-and-Chromium-based-browsers-Chrome-Edge-Brave-Opera-Vivaldi-logos-400x260-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@theJoshMeister\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joshua Long\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-and-google-patch-zero-day-vulnerability-used-to-hack-iphones\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2025\/03\/Safari-and-Chromium-based-browsers-Chrome-Edge-Brave-Opera-Vivaldi-logos-400x260-1.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2025\/03\/Safari-and-Chromium-based-browsers-Chrome-Edge-Brave-Opera-Vivaldi-logos-400x260-1.jpg\",\"width\":400,\"height\":260,\"caption\":\"Apple Safari and Chromium-based browsers: Google Chrome, Microsoft Edge, Brave icons logos\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-and-google-patch-zero-day-vulnerability-used-to-hack-iphones\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-and-google-patch-zero-day-vulnerability-used-to-hack-iphones\/\",\"name\":\"Apple and Google patch zero-day vulnerability used to hack iPhones - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-and-google-patch-zero-day-vulnerability-used-to-hack-iphones\/#primaryimage\"},\"datePublished\":\"2025-03-12T14:24:42+00:00\",\"dateModified\":\"2025-03-13T21:04:33+00:00\",\"description\":\"Apple has patched its third zero-day security vulnerability of 2025\\u2014and Google also patched the same flaw. Here is everything you need to know to keep your Mac, iPhone, iPad, and Vision Pro safe.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-and-google-patch-zero-day-vulnerability-used-to-hack-iphones\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/apple-and-google-patch-zero-day-vulnerability-used-to-hack-iphones\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-and-google-patch-zero-day-vulnerability-used-to-hack-iphones\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Apple and Google patch zero-day vulnerability used to hack iPhones\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-and-google-patch-zero-day-vulnerability-used-to-hack-iphones\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-and-google-patch-zero-day-vulnerability-used-to-hack-iphones\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\"},\"headline\":\"Apple and Google patch zero-day vulnerability used to hack iPhones\",\"datePublished\":\"2025-03-12T14:24:42+00:00\",\"dateModified\":\"2025-03-13T21:04:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-and-google-patch-zero-day-vulnerability-used-to-hack-iphones\/#webpage\"},\"wordCount\":1656,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-and-google-patch-zero-day-vulnerability-used-to-hack-iphones\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2025\/03\/Safari-and-Chromium-based-browsers-Chrome-Edge-Brave-Opera-Vivaldi-logos-400x260-1.jpg\",\"keywords\":[\"Arc\",\"Brave\",\"Chrome\",\"Chrome Browser\",\"Chromium\",\"Google Chrome\",\"iOS\",\"iOS 18\",\"iPadOS\",\"iPadOS 18\",\"macOS\",\"macOS Sequoia\",\"macOS Sonoma\",\"macOS Ventura\",\"Microsoft Edge\",\"Opera\",\"Safari\",\"Security Updates\",\"Vivaldi\"],\"articleSection\":[\"Software &amp; Apps\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/apple-and-google-patch-zero-day-vulnerability-used-to-hack-iphones\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\",\"name\":\"Joshua Long\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"caption\":\"Joshua Long\"},\"description\":\"Joshua Long (@theJoshMeister), formerly Intego\\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \\u2014\",\"sameAs\":[\"https:\/\/security.thejoshmeister.com\",\"https:\/\/www.facebook.com\/JoshLong\",\"https:\/\/www.instagram.com\/thejoshmeister\/\",\"https:\/\/www.linkedin.com\/in\/thejoshmeister\",\"https:\/\/www.pinterest.com\/thejoshmeister\/\",\"https:\/\/twitter.com\/theJoshMeister\",\"https:\/\/www.youtube.com\/@theJoshMeister\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Apple has patched its third zero-day security vulnerability of 2025\u2014and Google also patched the same flaw. Here is everything you need to know to keep your Mac, iPhone, iPad, and Vision Pro safe.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/apple-and-google-patch-zero-day-vulnerability-used-to-hack-iphones\/","og_locale":"en_US","og_type":"article","og_title":"Apple and Google patch zero-day vulnerability used to hack iPhones - The Mac Security Blog","og_description":"Apple has patched its third zero-day security vulnerability of 2025\u2014and Google also patched the same flaw. Here is everything you need to know to keep your Mac, iPhone, iPad, and Vision Pro safe.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/apple-and-google-patch-zero-day-vulnerability-used-to-hack-iphones\/","og_site_name":"The Mac Security Blog","article_author":"https:\/\/www.facebook.com\/JoshLong","article_published_time":"2025-03-12T14:24:42+00:00","article_modified_time":"2025-03-13T21:04:33+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2025\/03\/Safari-and-Chromium-based-browsers-Chrome-Edge-Brave-Opera-Vivaldi-logos-400x260-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_creator":"@theJoshMeister","twitter_misc":{"Written by":"Joshua Long","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-and-google-patch-zero-day-vulnerability-used-to-hack-iphones\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2025\/03\/Safari-and-Chromium-based-browsers-Chrome-Edge-Brave-Opera-Vivaldi-logos-400x260-1.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2025\/03\/Safari-and-Chromium-based-browsers-Chrome-Edge-Brave-Opera-Vivaldi-logos-400x260-1.jpg","width":400,"height":260,"caption":"Apple Safari and Chromium-based browsers: Google Chrome, Microsoft Edge, Brave icons logos"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-and-google-patch-zero-day-vulnerability-used-to-hack-iphones\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/apple-and-google-patch-zero-day-vulnerability-used-to-hack-iphones\/","name":"Apple and Google patch zero-day vulnerability used to hack iPhones - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-and-google-patch-zero-day-vulnerability-used-to-hack-iphones\/#primaryimage"},"datePublished":"2025-03-12T14:24:42+00:00","dateModified":"2025-03-13T21:04:33+00:00","description":"Apple has patched its third zero-day security vulnerability of 2025\u2014and Google also patched the same flaw. Here is everything you need to know to keep your Mac, iPhone, iPad, and Vision Pro safe.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-and-google-patch-zero-day-vulnerability-used-to-hack-iphones\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/apple-and-google-patch-zero-day-vulnerability-used-to-hack-iphones\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-and-google-patch-zero-day-vulnerability-used-to-hack-iphones\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Apple and Google patch zero-day vulnerability used to hack iPhones"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-and-google-patch-zero-day-vulnerability-used-to-hack-iphones\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-and-google-patch-zero-day-vulnerability-used-to-hack-iphones\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1"},"headline":"Apple and Google patch zero-day vulnerability used to hack iPhones","datePublished":"2025-03-12T14:24:42+00:00","dateModified":"2025-03-13T21:04:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-and-google-patch-zero-day-vulnerability-used-to-hack-iphones\/#webpage"},"wordCount":1656,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-and-google-patch-zero-day-vulnerability-used-to-hack-iphones\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2025\/03\/Safari-and-Chromium-based-browsers-Chrome-Edge-Brave-Opera-Vivaldi-logos-400x260-1.jpg","keywords":["Arc","Brave","Chrome","Chrome Browser","Chromium","Google Chrome","iOS","iOS 18","iPadOS","iPadOS 18","macOS","macOS Sequoia","macOS Sonoma","macOS Ventura","Microsoft Edge","Opera","Safari","Security Updates","Vivaldi"],"articleSection":["Software &amp; Apps"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/apple-and-google-patch-zero-day-vulnerability-used-to-hack-iphones\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1","name":"Joshua Long","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","caption":"Joshua Long"},"description":"Joshua Long (@theJoshMeister), formerly Intego\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \u2014","sameAs":["https:\/\/security.thejoshmeister.com","https:\/\/www.facebook.com\/JoshLong","https:\/\/www.instagram.com\/thejoshmeister\/","https:\/\/www.linkedin.com\/in\/thejoshmeister","https:\/\/www.pinterest.com\/thejoshmeister\/","https:\/\/twitter.com\/theJoshMeister","https:\/\/www.youtube.com\/@theJoshMeister"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2025\/03\/Safari-and-Chromium-based-browsers-Chrome-Edge-Brave-Opera-Vivaldi-logos-400x260-1.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-qTV","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/103411"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=103411"}],"version-history":[{"count":10,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/103411\/revisions"}],"predecessor-version":[{"id":103429,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/103411\/revisions\/103429"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/103407"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=103411"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=103411"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=103411"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}