LIVE NEWS
  • Five AI Compute Architectures Every Engineer Should Know: CPUs, GPUs, TPUs, NPUs, and LPUs Compared
  • UK’s warm and dry April 1976 was a taste of scorching summer to come | Drought
  • UK PM Keir Starmer visits Gulf to shore up ‘fragile’ US-Iran ceasefire | US-Israel war on Iran
  • Today is your last chance to score the Samsung Galaxy Z TriFold, but it will sell out in minutes — here’s what you can do to boost your odds
  • Australia news live: Dutton given key board appointment by Queensland government; Victorian teachers to hold rolling half-day strikes | Australia news
  • With the World’s First $7M Leaderboard, Spartans Changes the Best Online Casino Race Against PartyPoker & Golden Nugget
  • Is the Keystone XL Pipeline Back?
  • ‘He Was Disappointed’: NATO’s Chief on Recent Trump Meeting
Prime Reports
  • Home
  • Popular Now
  • Crypto
  • Cybersecurity
  • Economy
  • Geopolitics
  • Global Markets
  • Politics
  • See More
    • Artificial Intelligence
    • Climate Risks
    • Defense
    • Healthcare Innovation
    • Science
    • Technology
    • World
Prime Reports
  • Home
  • Popular Now
  • Crypto
  • Cybersecurity
  • Economy
  • Geopolitics
  • Global Markets
  • Politics
  • Artificial Intelligence
  • Climate Risks
  • Defense
  • Healthcare Innovation
  • Science
  • Technology
  • World
Home»Cybersecurity»Apple Intelligence AI Guardrails Bypassed in New Attack
Cybersecurity

Apple Intelligence AI Guardrails Bypassed in New Attack

primereportsBy primereportsApril 9, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Apple Intelligence AI Guardrails Bypassed in New Attack
Share
Facebook Twitter LinkedIn Pinterest Email


Researchers from RSAC have found a way to bypass the safety protocols of Apple’s Intelligence AI with a high success rate.

Apple Intelligence is a deeply integrated personal intelligence system for iOS, iPadOS, and macOS that combines generative AI with personal context.

It primarily processes tasks directly on Apple silicon via a compact on-device LLM. The AI draws on the user’s unique context (messages, photos, and schedules) to power practical features such as system-wide writing tools and Siri. For more complex reasoning, it offloads requests to larger foundation models via Private Cloud Compute (PCC) on Apple’s dedicated cloud infrastructure.

Apple Intelligence has been examined by the research team of RSAC, the organization that hosts the RSAC Conference. 

The researchers set out to bypass the local LLM’s input and output filters (designed to block malicious input and prevent undesirable output), as well as internal guardrails to influence its actions.

To achieve this, they combined two distinct adversarial techniques. The first is Neural Execs, a known prompt injection attack that uses ‘gibberish’ inputs to trick the AI into executing arbitrary, attacker-defined tasks. These inputs act as universal triggers that do not need to be remade for different payloads.

Advertisement. Scroll to continue reading.

The second method, used by the RSAC researchers to bypass input and output filters, is Unicode manipulation. By writing malicious output text backward and using the Unicode right-to-left-override function they were able to bypass content restrictions.

“Essentially, we encoded the malicious/offensive English-language output text by writing it backwards and using our Unicode hack to force the LLM to render it correctly,” the researchers explained.

Combining the two methods can allow attackers to force the local Apple Intelligence LLM to produce offensive content or, more critically, manipulate private data and functionality within third-party applications integrated with Apple Intelligence, such as health data or personal media.

The attack was tested with 100 random prompts and the researchers achieved a success rate of 76%. 

They estimate that between 100,000 and 1 million users have installed apps that may be vulnerable to such attacks. 

“RSAC estimates that there were at least 200 million Apple Intelligence-capable devices in consumers’ hands as of December 2025, and the Apple App Store already features apps using Apple Intelligence—so it’s already a high-value target,” the researchers noted.

Apple was notified in October 2025 and, according to RSAC Research, protections were rolled out in the recent iOS 26.4 and macOS 26.4

The researchers have not seen any evidence of malicious exploitation.

Related: Google API Keys in Android Apps Expose Gemini Endpoints to Unauthorized Access

Related: Anthropic Unveils ‘Claude Mythos’ – A Cybersecurity Breakthrough That Could Also Supercharge Attacks

Related: The New Rules of Engagement: Matching Agentic Attack Speed

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleFed officials still foresee rate cut this year, despite war impacts, minutes show
Next Article Ceasefire or no ceasefire, the Middle East's reshuffling is not yet done
primereports
  • Website

Related Posts

Cybersecurity

Claude Managed Agents bring execution and control to AI agent workflows

April 9, 2026
Cybersecurity

Don’t just fight fraud, hunt it

April 9, 2026
Cybersecurity

Anthropic Launches Project Glasswing to Fix Software Bugs With AI

April 8, 2026
Add A Comment
Leave A Reply Cancel Reply

Top Posts

Global Resources Outlook 2024 | UNEP

December 6, 20258 Views

The D Brief: DHS shutdown likely; US troops leave al-Tanf; CNO’s plea to industry; Crowded robot-boat market; And a bit more.

February 14, 20264 Views

German Chancellor Merz faces difficult mission to Israel – DW – 12/06/2025

December 6, 20254 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Latest Reviews

Subscribe to Updates

Get the latest tech news from FooBar about tech, design and biz.

PrimeReports.org
Independent global news, analysis & insights.

PrimeReports.org brings you in-depth coverage of geopolitics, markets, technology and risk – with context that helps you understand what really matters.

Editorially independent · Opinions are those of the authors and not investment advice.
Facebook X (Twitter) LinkedIn YouTube
Key Sections
  • World
  • Geopolitics
  • Popular Now
  • Artificial Intelligence
  • Cybersecurity
  • Crypto
All Categories
  • Artificial Intelligence
  • Climate Risks
  • Crypto
  • Cybersecurity
  • Defense
  • Economy
  • Geopolitics
  • Global Markets
  • Healthcare Innovation
  • Politics
  • Popular Now
  • Science
  • Technology
  • World
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms & Conditions
  • Disclaimer
  • Cookie Policy
  • DMCA / Copyright Notice
  • Editorial Policy

Sign up for Prime Reports Briefing – essential stories and analysis in your inbox.

By subscribing you agree to our Privacy Policy. You can opt out anytime.
Latest Stories
  • Five AI Compute Architectures Every Engineer Should Know: CPUs, GPUs, TPUs, NPUs, and LPUs Compared
  • UK’s warm and dry April 1976 was a taste of scorching summer to come | Drought
  • UK PM Keir Starmer visits Gulf to shore up ‘fragile’ US-Iran ceasefire | US-Israel war on Iran
© 2026 PrimeReports.org. All rights reserved.
Privacy Terms Contact

Type above and press Enter to search. Press Esc to cancel.