{"id":34608,"date":"2020-04-24T14:32:14","date_gmt":"2020-04-24T14:32:14","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/31150\/Apple-Disputes-Recent-iOS-Zero-Day-Claim.html"},"modified":"2020-04-24T14:32:14","modified_gmt":"2020-04-24T14:32:14","slug":"apple-disputes-recent-ios-zero-day-claim","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/apple-disputes-recent-ios-zero-day-claim\/","title":{"rendered":"Apple Disputes Recent iOS Zero Day Claim"},"content":{"rendered":"<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet3.cbsistatic.com\/hub\/i\/2019\/12\/20\/0c6fb8e6-afaa-44ac-9910-8e6fdd829db3\/apple-logo.jpg\" class alt=\"Apple logo\"><\/span><span class=\"credit\">Image: Laurenz Heymann<\/span><\/p>\n<p>In a statement today, Apple said it &#8220;thoroughly investigated&#8221; a recent report about hackers exploiting three iOS vulnerabilities but &#8220;found no evidence they were used against customers.&#8221;<\/p>\n<p>Apple&#8217;s statement comes after on Wednesday, cyber-security firm <a href=\"https:\/\/blog.zecops.com\/vulnerabilities\/youve-got-0-click-mail\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">ZecOps published a report<\/a> detailing three iOS vulnerabilities that impacted the Apple Mail client.<\/p>\n<p>ZecOps said it found evidence of the bugs being used in the wild against a list of high-profile targets that included the likes of:<\/p>\n<ul>\n<li>Individuals from a Fortune 500 organization in North America<\/li>\n<li>An executive from a carrier in Japan&nbsp;<\/li>\n<li>A VIP from Germany<\/li>\n<li>MSSPs from Saudi Arabia and Israel<\/li>\n<li>A Journalist in Europe<\/li>\n<li>Suspected: An executive from a Swiss enterprise<\/li>\n<\/ul>\n<p>However, in a report published today, Apple said that based on the details shared by ZecOps in its report, it could not reach the same conclusion &#8212; that the bug was exploited in the wild. Apple&#8217;s full statement is below:<\/p>\n<blockquote readability=\"12\">\n<p>&#8220;Apple takes all reports of security threats seriously. We have thoroughly investigated the researcher&#8217;s report and, based on the information provided, have concluded these issues do not pose an immediate risk to our users. The researcher identified three issues in Mail, but alone they are insufficient to bypass iPhone and iPad security protections, and we have found no evidence they were used against customers. These potential issues will be addressed in a software update soon. We value our collaboration with security researchers to help keep our users safe and will be crediting the researcher for their assistance.&#8221;<\/p>\n<\/blockquote>\n<p>The ZecOps research had sparked some dissenting opinions on Twitter[<a href=\"https:\/\/twitter.com\/dinodaizovi\/status\/1253040410064302081\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">1<\/a>, <a href=\"https:\/\/twitter.com\/tehjh\/status\/1253010131283034114\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">2<\/a>, <a href=\"https:\/\/twitter.com\/DidymaWorks\/status\/1253166612800131072\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">3<\/a>], where several iOS security researchers had questioned the conclusion that the bugs were exploited in the real world.<\/p>\n<p>The original research was basing its assumption of the existence of in-the-wild exploitation on crash logs found on the device.<\/p>\n<p>These crash logs were interpreted as attempts to trigger the bug.<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_zd_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p>ZecOps said the failed exploitation left an empty email and a crash log on the device. During subsequent or successful exploitation, ZecOps said the attacker would delete the empty emails in order to hide the attacks from the user.<\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/apple-disputes-recent-ios-zero-day-claim\/\" class=\"lazy\" alt=\"apple-mail-exploit.jpg\" data-original=\" https:\/\/zdnet2.cbsistatic.com\/hub\/i\/2020\/04\/22\/1c18213c-c253-443c-866d-7f27834cc944\/apple-mail-exploit.jpg\"><\/span><noscript><\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet2.cbsistatic.com\/hub\/i\/2020\/04\/22\/1c18213c-c253-443c-866d-7f27834cc944\/apple-mail-exploit.jpg\" class alt=\"apple-mail-exploit.jpg\"><\/span><\/p>\n<p><\/noscript> <span class=\"credit\">Image: ZecOps<\/span><\/p>\n<p>However, security researchers pointed out that if the attacker would delete the emails, they would most likely have deleted the crash logs as well.<\/p>\n<p>The counterpoint to ZecOps&#8217; original research and conclusion appears to be that the cyber-security firm was merely seeing malformed emails triggering a benign bug, rather than malicious attacks against iOS users, and that Apple needed additional evidence to classify these crash bugs as active attacks.<\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/apple-disputes-recent-ios-zero-day-claim\/\" class=\"lazy\" alt=\"zecops-comments.png\" data-original=\" https:\/\/zdnet3.cbsistatic.com\/hub\/i\/2020\/04\/24\/eea29412-d918-4848-b5df-7acbdd144c1b\/zecops-comments.png\"><\/span><noscript><\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet3.cbsistatic.com\/hub\/i\/2020\/04\/24\/eea29412-d918-4848-b5df-7acbdd144c1b\/zecops-comments.png\" class alt=\"zecops-comments.png\"><\/span><\/p>\n<p><\/noscript><\/p>\n<p>Responding to a <em>Reuters<\/em> report today, ZecOps issued a statement promising to release more information on the bug once a patch is available to the entire iOS userbase.<\/p>\n<p>The bugs have been patched in iOS 13.4.5 beta, and the fix is expected to reach the general iOS stable channel in the coming weeks.<\/p>\n<p>The full ZecOps statement is below:<\/p>\n<blockquote readability=\"9\">\n<p>&#8220;According to ZecOps data, there were triggers in-the-wild for this vulnerability on a few organizations. We want to thank Apple for working on a patch, and we&#8217;re looking forward to updating our devices once it&#8217;s available. ZecOps will release more information and POCs once a patch is available.&#8221;<\/p>\n<\/blockquote>\n<p>The &#8220;existence&#8221; of the bugs was never questioned, neither by Apple or the security community, and installing the iOS 13.4.5 release is recommended when it comes out.<\/p>\n<p>In its statement, Apple wanted to make it clear that it values bug reports from the cyber-security community, in which the company has <a href=\"https:\/\/www.zdnet.com\/article\/apple-expands-bug-bounty-to-macos-raises-bug-rewards\/\" target=\"_blank\" rel=\"noopener noreferrer\">invested considerable resources and attention<\/a> in recent years, but said the conclusion of this particular report couldn&#8217;t be verified from its side, at least for the time being and with the information it received.<\/p>\n<p> READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/31150\/Apple-Disputes-Recent-iOS-Zero-Day-Claim.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":34609,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[8598],"class_list":["post-34608","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlinehackerphoneflawapplezero-day"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Apple Disputes Recent iOS Zero Day Claim 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/apple-disputes-recent-ios-zero-day-claim\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Apple Disputes Recent iOS Zero Day Claim 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/apple-disputes-recent-ios-zero-day-claim\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-04-24T14:32:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/apple-disputes-recent-ios-zero-day-claim.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-disputes-recent-ios-zero-day-claim\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-disputes-recent-ios-zero-day-claim\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Apple Disputes Recent iOS Zero Day Claim\",\"datePublished\":\"2020-04-24T14:32:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-disputes-recent-ios-zero-day-claim\\\/\"},\"wordCount\":624,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-disputes-recent-ios-zero-day-claim\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/apple-disputes-recent-ios-zero-day-claim.jpg\",\"keywords\":[\"headline,hacker,phone,flaw,apple,zero day\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-disputes-recent-ios-zero-day-claim\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-disputes-recent-ios-zero-day-claim\\\/\",\"name\":\"Apple Disputes Recent iOS Zero Day Claim 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-disputes-recent-ios-zero-day-claim\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-disputes-recent-ios-zero-day-claim\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/apple-disputes-recent-ios-zero-day-claim.jpg\",\"datePublished\":\"2020-04-24T14:32:14+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-disputes-recent-ios-zero-day-claim\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-disputes-recent-ios-zero-day-claim\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-disputes-recent-ios-zero-day-claim\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/apple-disputes-recent-ios-zero-day-claim.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/apple-disputes-recent-ios-zero-day-claim.jpg\",\"width\":1000,\"height\":500},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-disputes-recent-ios-zero-day-claim\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,phone,flaw,apple,zero day\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinehackerphoneflawapplezero-day\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Apple Disputes Recent iOS Zero Day Claim\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Apple Disputes Recent iOS Zero Day Claim 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/apple-disputes-recent-ios-zero-day-claim\/","og_locale":"en_US","og_type":"article","og_title":"Apple Disputes Recent iOS Zero Day Claim 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/apple-disputes-recent-ios-zero-day-claim\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-04-24T14:32:14+00:00","og_image":[{"width":1000,"height":500,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/apple-disputes-recent-ios-zero-day-claim.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/apple-disputes-recent-ios-zero-day-claim\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/apple-disputes-recent-ios-zero-day-claim\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Apple Disputes Recent iOS Zero Day Claim","datePublished":"2020-04-24T14:32:14+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/apple-disputes-recent-ios-zero-day-claim\/"},"wordCount":624,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/apple-disputes-recent-ios-zero-day-claim\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/apple-disputes-recent-ios-zero-day-claim.jpg","keywords":["headline,hacker,phone,flaw,apple,zero day"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/apple-disputes-recent-ios-zero-day-claim\/","url":"https:\/\/www.threatshub.org\/blog\/apple-disputes-recent-ios-zero-day-claim\/","name":"Apple Disputes Recent iOS Zero Day Claim 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/apple-disputes-recent-ios-zero-day-claim\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/apple-disputes-recent-ios-zero-day-claim\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/apple-disputes-recent-ios-zero-day-claim.jpg","datePublished":"2020-04-24T14:32:14+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/apple-disputes-recent-ios-zero-day-claim\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/apple-disputes-recent-ios-zero-day-claim\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/apple-disputes-recent-ios-zero-day-claim\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/apple-disputes-recent-ios-zero-day-claim.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/apple-disputes-recent-ios-zero-day-claim.jpg","width":1000,"height":500},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/apple-disputes-recent-ios-zero-day-claim\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,phone,flaw,apple,zero day","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackerphoneflawapplezero-day\/"},{"@type":"ListItem","position":3,"name":"Apple Disputes Recent iOS Zero Day Claim"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/34608","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=34608"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/34608\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/34609"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=34608"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=34608"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=34608"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}