Close Menu
  • Tech Insights
  • Laptops
  • Mobiles
  • Gaming
  • Apps
  • Money
  • Latest in Tech
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram
TechzLab – Tech News, Gadgets, Mobile & IT UpdatesTechzLab – Tech News, Gadgets, Mobile & IT Updates
  • Tech Insights
  • Laptops
  • Mobiles
  • Gaming
  • Apps
  • Money
  • Latest in Tech
TechzLab – Tech News, Gadgets, Mobile & IT UpdatesTechzLab – Tech News, Gadgets, Mobile & IT Updates
Home » Apple Operating Systems are Being Targeted by Threat Actors, Report Finds
Gaming

Apple Operating Systems are Being Targeted by Threat Actors, Report Finds

adminBy adminJanuary 17, 2025No Comments6 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest Email

The number of macOS vulnerabilities exploited in 2023 increased by more than 30%, according to a new report. The Software Vulnerability Ratings Report 2024 from patch management software company Action1 also found that Microsoft Office programs are becoming more exploitable, while attackers are targeting load balancers like NGINX and Citrix at a record rate.

Action1 analysts used data from the National Vulnerability Database and CVEdetails.com to draw five insights into how the threat landscape changed from 2022 to 2023. Maintenance of the NVD has slowed significantly since February as the National Institute of Standards and Technology tries to cope with a backlog of software and hardware flaws being submitted. NIST said the slowdown was the result of “an increase in software and, therefore, vulnerabilities, as well as a change in interagency support.”

1. macOS and iOS increasingly targeted

The report found the exploitation rates macOS and iOS experienced increased by 7% and 8% from 2022 to 2023, suggesting they are being increasingly targeted by bad actors.

The exploitation rate is defined as the ratio of exploited vulnerabilities to the total number of vulnerabilities, and provides a measure of the software’s susceptibility to exploitation. In contrast, the exploitation rates of Windows desktop operating systems remained stable at 4%, showing how Microsoft has a stable vulnerability management process.

Despite the total number of macOS vulnerabilities identified decreasing by 29% in 2023, 18 exploited vulnerabilities were reported, marking a more than 30% increase from the year before.

When it comes to mobile operating systems, the exploitation rate of 8% for iOS was significantly higher than Android’s 0.2%. This shows that, despite the fact that Android devices had more vulnerabilities reported in total, threat actors were focusing their efforts on exploiting iPhones.

iOS also suffered the highest number of remote code exploitation attacks of all mobile operating systems analysed over 2021, 2022 and 2023. An application with an increased RCE count may have more potential entry points for attackers to exploit. The report authors say the targeted nature of iPhones is possibly due to the perception of the valuable data they store.

“The increase in exploited vulnerabilities for MacOS and iOS is a concerning trend for Apple,” the analysts wrote. “For some reason, the company is not managing to fix vulnerabilities before attackers exploit them.

“For organisations, this means they should not only ensure regular updates for Apple OS but also consider implementing additional security measures for Mac devices.”

2. Load balancers have record exploitation rate

Load balancers NGINX and Citrix both had very high exploitation rates in 2023 — 100% and 57%, respectively. Despite load balancer vulnerabilities making up only 0.2% of the total number of vulnerabilities from 2021 to 2023, the exploitation rates are significant because of the potential impact a successful exploitation can have.

Attackers can gain the ability to intercept, modify and redirect network traffic, thereby accessing sensitive data and disrupting services. Compromised load balancers can also serve as entry points for launching further attacks within the network.

SEE: About 2000 Citrix NetScalers Were Compromised in Massive Attack Campaigns

For example, the 2023 CitrixBleed zero-day vulnerability allowed attackers to send a large HTTP GET request to a NetScaler ADC or Citrix Gateway, resulting in a buffer overflow and the adjacent memory leaking. More than 300 companies were warned about their exposure by the U.S.’s Cybersecurity and Infrastructure Security Agency, and telecommunications company Xfinity said 36 million customers’ sensitive information was stolen through CitrixBleed attacks.

The report’s authors wrote: “For organisations, this means they need to pay close attention to ensuring regular updates for the Citrix load balancer or look for alternatives, considering the company’s needs.”

Must-read security coverage

3. Microsoft SQL Server RCE vulnerabilities surge

In 2023, 17 vulnerabilities were identified in Microsoft SQL Server, marking a 1,600% increase compared to the previous years. Each one was an RCE, demonstrating its concerning number of entry points. The spike suggests that attackers are getting faster at discovering and exploiting unknown RCEs, and that more undiscovered vulnerabilities might remain in Microsoft SQL.

The report’s authors wrote: “MSSQL is a lucrative target for hackers due to its widespread use in enterprise environments, housing valuable data like customer information and financial records. Its remote accessibility makes it susceptible to exploitation from anywhere.

“Consequently, organisations must prioritise robust security measures to safeguard their MSSQL servers and prevent potential data breaches.”

SEE: Microsoft Security Vulnerabilities Decreased by 5% in 2023, According to a BeyondTrust report

4. Microsoft Office targeted due to likelihood of human error

Microsoft Office has the highest total number of vulnerabilities among all office apps. Around 80% of its vulnerabilities are deemed critical each year, and between 40 and 50% of them are RCEs. Furthermore, its exploitation rate increased by 5% in 2023.

Attackers view office apps as more easily exploitable than other software because they are user-facing and therefore prone to human error. Common user interactions like opening documents, enabling macros and clicking on embedded links can be utilised as part of phishing attacks.

SEE: Follina abuses Microsoft Office to execute remote code

Microsoft Office, in particular, is widely used and so presents the best opportunity for a successful attack of this nature, as it is recognised and trusted by users. The authors wrote that we can expect more phishing attacks aimed at exploiting MS Office vulnerabilities.

They wrote: “This underscores the need for CISOs to enforce security awareness among employees and enhance endpoint monitoring with endpoint protection systems, in addition to robust patching.”

5. Microsoft Edge experiences spike in RCEs and vulnerabilities

Edge saw the highest number of total RCE vulnerabilities among major web browsers in the last three years, with 14. The number grew by 500% from 2021 to 2022, and then 17% from 2022 to 2023. They accounted for 10% of all reported vulnerabilities, while just 1% of vulnerabilities in Chrome and Firefox were RCEs.

SEE: Microsoft Edge cheat sheet

In addition, Edge had a 7% vulnerability exploitation rate in 2023 — an increase from 2022’s 5% — while Chrome and Firefox had about 2% and 3%, respectively. While Edge actually had the lowest number of reported vulnerabilities of the three browsers in 2022 and 2023, their exploitation is proving the most lucrative for attackers.

The report authors explained: ”The fact that Edge faces an increase in RCE and exploited vulnerabilities, despite having a relatively low number of total vulnerabilities, suggests that Microsoft does not yet actively enforce a vulnerability management program for this web browser as rigorously as Google does for Chrome or Mozilla does for Firefox.

“This implies that it might not be a good idea to use Edge as the main corporate web browser.”

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
admin
  • Website

Related Posts

eBay’s latest sale slashes up to AU$76.95 off the Nintendo Switch 2

August 25, 2025

Mafia: The Old Country releasing on 8 August, 2025: Here’s everything you need to know

August 24, 2025

The Witcher Tabletop RPG Books Are Only $15 at Humble Bundle Right Now

August 23, 2025

Comments are closed.

Latest
  • Smart Raises $ 16.7m to Power Jobs and Financial Services in Indonesia | Techcrunch August 25, 2025
  • eBay’s latest sale slashes up to AU$76.95 off the Nintendo Switch 2 August 25, 2025
  • Honor X7d announced with a 6.77-inch display and Snapdragon 685 August 25, 2025
  • I was at the Windows 95 launch 30 years ago – I still can’t stop thinking about it August 25, 2025
  • The best laptops for students, tested by a tech expert and former teacher – The Telegraph August 25, 2025
We are social
  • Facebook
  • Twitter
  • Pinterest
  • Instagram
  • YouTube
  • Vimeo

Subscribe to Updates

Get the latest creative news from Techzlab.

Tags
Apple artificial intelligence avp ChatGPT cybersecurity data centers defense tech doge Donald Trump Elon Musk evergreens EVs Exclusive Google Google tax Grok Hugging Face humanoid robot Huspy In Brief lawsuit Meta Microsoft Openai Part Perplexity Pinterest Rippling robotics Sequoia Shaun Maguire slate SMBs social media space-based solar power SpaceX Spotify TechCrunch All Stage TechCrunch All Stage 2025 Tesla Trump Administration X Xai YouTube YouTube Shorts
Archives
Quick Link
  • Apps (274)
  • From the Editor (3)
  • Gaming (274)
  • Laptops (275)
  • Latest in Tech (275)
  • Mobiles (276)
  • Money (100)
  • Tech Insights (274)
Don't miss

iPhone 17 Air vs Samsung Galaxy S25 Edge: Which ultra-thin flagship to buy?

August 25, 2025

Today’s NYT Mini Crossword Answers for Aug. 24

August 24, 2025

I tried every new AI feature on the Google Pixel 10 series – my thoughts as an AI expert

August 23, 2025
Follow us
  • Facebook
  • Twitter
  • Pinterest
  • Instagram
  • YouTube
  • Vimeo
© 2025 Techzlab.com Designed and Developed by WebExpert.
  • Home
  • From the Editor
  • Money
  • Privacy Policy
  • Contact

Type above and press Enter to search. Press Esc to cancel.