News India Live, Digital Desk: If you use Apple’s MacBook or Google Chrome browser for your work, then be careful. CERT-In has revealed in its latest advisory that some serious security vulnerabilities have been found in these platforms. By taking advantage of these flaws, hackers can not only steal your data but can also take control of your entire system.
1. What is the threat to macOS users? (Apple Alert)
The agency has criticized Apple’s productivity apps, especially Pages And Keynote Major shortcomings have been detected.
Affected versions: Pages and Keynote older than 15.1 All versions.
How does the attack happen: A hacker can send you a special type of ‘malicious’ file. As soon as you open that file, it can enter the system’s memory and steal your sensitive data.
Tracking ID: It is being tracked under CVE-2025-46316 and CVE-2025-46306.
2. ‘High-risk’ attack on Google Chrome users
The flaw found in the Chrome browser is even more dangerous because it allows ‘remote code execution’ (RCE).
Affected versions: * Windows and Mac: Versions older than 144.0.7559.109 or .110.
Linux: Versions older than 144.0.7559.109.
Reason for danger: Due to incorrect implementation of Chrome’s ‘Background Fetch API’, hackers can remotely run viruses or harmful code on your computer.
3. Do these 3 things immediately (Immediate Actions)
The government has advised users to take the following steps without delay:
| platform | What to do? |
|---|---|
| Google Chrome | browser’s Settings > About Chrome got into. This will check for automatic updates. Update it and ‘Relaunch’ the browser. |
| Apple macOS | Go to the App Store and find the Pages and Keynote apps. version 15.1 Update on. to the system macOS Sequoia 15.6 Or keep updating above that. |
| General Safety | Do not click on attachments or suspicious links from any unknown email. |
Why is this a matter of concern?
CERT-In has identified this threat ‘High Severity’ Has been placed in the category of. This means an attacker doesn’t need to be near you to access your system; He can break into your computer from any corner of the world through the internet. Cyber experts say that postponing ‘software updates’ in the digital age is like giving the keys to your safe to a thief.




