Here’s what we know, and what you need to know, about Coruna and DarkSword, two advanced iPhone hacking tools discovered by ...
Leaked "DarkSword" exploits published to GitHub allow hackers and cybercriminals to target iPhone users running old versions ...
Once a victim is exposed to a malicious link, the exploit gains filesystem access and exfiltrates data to an ...
Hackers use credentials stolen in the GlassWorm campaign to access GitHub accounts and inject malware into Python ...
A threat actor who stole credentials from a legitimate node package manager (npm) publisher has spread a persistent, ...
This week, the AppsFlyer SDK breach, JPMorgan sued over ties to a Ponzi scheme, the OFAC sanctioned a network tied to North ...
Uh-oh. Now anyone can easily use it.
A cryptocurrency scam known as "ShieldGuard" has been dismantled after researchers identified it as a malicious browser ...
Beware! Shadowy attackers have been using an iOS exploit to hack vulnerable devices.
Since November, shadowy attackers have been using the 'DarkSword' iOS exploit to hack vulnerable iPhones on certain iOS 18 ...
The open-source supply chain hack represents “meaningful industry-wide risk”, according to an industry expert.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results