Technology ❯Cybersecurity ❯Vulnerabilities ❯Zero-Day Exploits
Microsoft’s analysis details how Spotlight plugins could bypass TCC protections to harvest Apple Intelligence data, urging users to verify they have installed Apple’s March security update.