Thousands of iPhones were compromised using the Coruna exploit kit, which chained 23 iOS vulnerabilities into advanced attacks used for espionage and cybercrime.
I used to tell people a factory reset was enough. Handing your old phone to your kid or passing a router to your sister? A ...
Founded in 2013, HTX has shown resilience through multiple crypto market cycles. While it has faced challenges, the exchange has continued to strengthen its transparency and security practices. Over ...
Security researchers say exploits used by governments to hack into Apple iPhones have been found used by cybercriminals. They ...
A highly sophisticated set of iPhone hijacking techniques has likely infected tens of thousands of phones or more. Clues suggest it was originally built for the US government.
Researchers said a sophisticated exploit kit with 23 iOS vulnerabilities is being used by espionage and cybercrime campaigns.
Verify has described the activity as the “first known mass iOS attack” campaign of its kind. Google said fragments of the exploit first appeared last February, with ties to an unnamed “customer of a ...
A highly sophisticated set of iPhone hijacking techniques has likely infected tens of thousands of phones or more, reports Wired. Clues suggest it was originally built for the US government, according ...
According to new technical analyses from Google and mobile security firm iVerify, Coruna's technical core comprises five complete exploit chains and 23 distinct iOS vulnerabilities that ...
A 22-year-old Alabama man pleaded guilty to extortion, cyberstalking, and computer fraud charges after hijacking the social media accounts of hundreds of young women (including minors).
Hacktivists claim they breached DHS systems, leaking records tied to 6,681 ICE contractor applicants, including major tech ...
The Google Threat Intelligence Group says it found an iPhone exploit kit that could crack the device and sniff out crypto wallets, apps and seed phrases to steal funds.