← Back to all briefings
Cybersecurity 5 min read Published Updated Credibility 40/100

Cybersecurity Briefing — March 24, 2020

Apple released macOS Catalina 10.15.4 and Security Update 2020-002 for Mojave and High Sierra, patching actively exploited WebKit flaws and other kernel and mail vulnerabilities.

Timeline plotting source publication cadence sized by credibility.
1 publication timestamps supporting this briefing. Source data (JSON)

Executive briefing: Apple shipped macOS Catalina 10.15.4 and Security Update 2020-002 for Mojave and High Sierra on . The release addresses WebKit memory corruption issues, including vulnerabilities reported as exploited in the wild, plus kernel, Mail, and SMB fixes.

Why it matters: macOS endpoints used for remote work or developer builds faced active browser exploitation risk. Organizations need to accelerate deployment of the cumulative updates across supported macOS versions.

  • Update all supported macOS: Deploy 10.15.4 or Security Update 2020-002 across Catalina, Mojave, and High Sierra devices; verify XProtect and Gatekeeper versions post-install.
  • Prioritize browser users: Patch systems heavily using Safari/WebKit first to close active exploitation windows.
  • Validate enterprise controls: Reconfirm kernel extensions, VPN clients, and endpoint agents remain functional after the update.
  • Review release notes: Track CVEs resolved (e.g., WebKit, kernel, Mail) and monitor Apple security updates for any subsequent supplemental patches.
Timeline plotting source publication cadence sized by credibility.
1 publication timestamps supporting this briefing. Source data (JSON)
Horizontal bar chart of credibility scores per cited source.
Credibility scores for every source cited in this briefing. Source data (JSON)

Continue in the Cybersecurity pillar

Return to the hub for curated research and deep-dive guides.

Visit pillar hub

Latest guides

  • Apple
  • macOS
  • Catalina
  • WebKit
Back to curated briefings