Technology ❯ Cybersecurity ❯ Exploits ❯ Sploitlight
Microsoft’s analysis details how Spotlight plugins could bypass TCC protections to harvest Apple Intelligence data, urging users to verify they have installed Apple’s March security update.