Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
Artwork

Content provided by Daily Security Review. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Daily Security Review or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Microsoft Exposes Major macOS Flaws in Transparency, Consent, and Control

1:23:13
 
Share
 

Manage episode 497232920 series 3645080
Content provided by Daily Security Review. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Daily Security Review or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

In this episode, we dive deep into Microsoft Threat Intelligence’s latest findings on two critical macOS vulnerabilities that shook Apple’s privacy defenses. The flaws, identified as CVE-2025-31199 (Sploitlight) and CVE-2024-44133 (HM Surf), specifically targeted Apple’s Transparency, Consent, and Control (TCC) framework, the system designed to guard user data and manage app permissions. Sploitlight exploited Spotlight’s plugin mechanism to access sensitive files like Photos.sqlite and Apple Intelligence caches, exposing personal geolocation details and private user activities. Meanwhile, HM Surf allowed attackers to tap into Safari data—including browsing history, camera, and microphone—without authorization.

We examine how these vulnerabilities managed to bypass Apple’s multi-layered security approach, from hardware-rooted protections like the Secure Enclave to advanced system defenses like Signed System Volume (SSV) and Kernel Integrity Protection (KIP). Despite Apple’s comprehensive platform security architecture, the incident underscores the evolving sophistication of threat actors targeting macOS.

Apple has since released patches to close these security gaps, but the case raises serious questions: Are the TCC framework and other privacy safeguards enough in the face of increasingly complex exploits? What does this mean for the future of macOS security and the trust users place in Apple’s privacy promises?

Join us as we unpack the technical details of Sploitlight and HM Surf, analyze Apple’s rapid response, and discuss how users and organizations can stay ahead of such privacy-breaching attacks.

#Apple #macOS #Sploitlight #HMSurf #CVE2025_31199 #CVE2024_44133 #cybersecurity #MicrosoftThreatIntelligence #TCC #Spotlight #Safari #AppleIntelligence #dataprivacy #vulnerabilities #SecureEnclave #SignedSystemVolume #KernelIntegrityProtection

  continue reading

253 episodes

Artwork
iconShare
 
Manage episode 497232920 series 3645080
Content provided by Daily Security Review. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Daily Security Review or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

In this episode, we dive deep into Microsoft Threat Intelligence’s latest findings on two critical macOS vulnerabilities that shook Apple’s privacy defenses. The flaws, identified as CVE-2025-31199 (Sploitlight) and CVE-2024-44133 (HM Surf), specifically targeted Apple’s Transparency, Consent, and Control (TCC) framework, the system designed to guard user data and manage app permissions. Sploitlight exploited Spotlight’s plugin mechanism to access sensitive files like Photos.sqlite and Apple Intelligence caches, exposing personal geolocation details and private user activities. Meanwhile, HM Surf allowed attackers to tap into Safari data—including browsing history, camera, and microphone—without authorization.

We examine how these vulnerabilities managed to bypass Apple’s multi-layered security approach, from hardware-rooted protections like the Secure Enclave to advanced system defenses like Signed System Volume (SSV) and Kernel Integrity Protection (KIP). Despite Apple’s comprehensive platform security architecture, the incident underscores the evolving sophistication of threat actors targeting macOS.

Apple has since released patches to close these security gaps, but the case raises serious questions: Are the TCC framework and other privacy safeguards enough in the face of increasingly complex exploits? What does this mean for the future of macOS security and the trust users place in Apple’s privacy promises?

Join us as we unpack the technical details of Sploitlight and HM Surf, analyze Apple’s rapid response, and discuss how users and organizations can stay ahead of such privacy-breaching attacks.

#Apple #macOS #Sploitlight #HMSurf #CVE2025_31199 #CVE2024_44133 #cybersecurity #MicrosoftThreatIntelligence #TCC #Spotlight #Safari #AppleIntelligence #dataprivacy #vulnerabilities #SecureEnclave #SignedSystemVolume #KernelIntegrityProtection

  continue reading

253 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play