Apple recently patched a severe zero-day flaw that allowed hackers to infect iPhones without the user even tapping anything.
The exploit was silently used to spy on journalists using a sophisticated spyware called Graphite, developed by surveillance firm Paragon.
The discovery came from Citizen Lab, a respected cybersecurity research group. In April 2025, Apple informed a select group of users, including two high-profile European and Italian journalists, that their devices were compromised. The infection occurred via a zero-click iMessage attack, meaning the spyware could be installed just by receiving a specially crafted message-no clicks required.
The exploited weakness was tied to how iOS handled photos and videos shared through iCloud links. Fortunately, Apple has addressed the issue with the release of iOS 18.3.1.
This isn’t an isolated case. In January, another journalist was alerted by Apple about being a target. This raises concerns of a broader surveillance campaign aimed specifically at members of the press.
While Apple’s reputation for prioritizing privacy and security remains intact, this incident highlights the relentless arms race between tech companies and cyber attackers. Even with the strongest defenses, vulnerabilities can be found and used before patches are rolled out.
For regular users, the takeaway is simple: keep your devices updated. Most attacks like this are highly targeted, but staying on the latest software ensures you’re protected from known threats. Delaying updates only gives attackers more time to exploit flaws that have already been fixed.