DarkSword, a serious iPhone exploit kit, just leaked on GitHub. If your device is running iOS 18.4 through 18.7 — or legacy versions 15.8.7 or 16.7.15 — you’re vulnerable. Contacts, messages, call ...
The exploit, revealed last week by Google’s Threat Intelligence Group, is now publicly available on GitHub, increasing the urgency for older iPhones and iPads to run the latest available iOS and ...
Last week, cybersecurity researchers uncovered a hacking campaign targeting iPhone users that used an advanced hacking tool called DarkSword. Now someone has leaked a newer version of DarkSword and ...
Threat actors have demonstrated just how quickly they operate today after exploiting a critical open source vulnerability within 20 hours, working only from the advisory description. The bug, CVE-2026 ...
The ‘DarkSword’ attack technique can covertly steal messages, contacts, saved credentials, cryptocurrency wallets, and more on iPhones running iOS 18.4 to 18.6.2. The ‘DarkSword’ attack technique can ...
Cybersecurity groups are sounding the alarm about DarkSword, the latest hacker tool that targets iPhone users. Credit: Jakub Porzycki/NurPhoto via Getty Images UPDATE: Mar. 19, 2026, 4:46 p.m. EDT ...
A vulnerability in Qualcomm’s Android Bootloader implementation allows unsigned code to run via the “efisp” partition on Android 16 devices. This is paired with a “fastboot” command oversight to ...
Apple has virtually eliminated the remaining addressable iPhones being targeted by the Coruna exploit being traded around the black market — that is, if you update your iPhone. An exploit potentially ...
Apple has detailed the security content for iOS 16.7.15, iOS 15.8.7, iPadOS 16.7.15, and iPadOS 15.8.7, confirming that the updates address the Coruna vulnerability disclosed last week by Google and ...
Hackers Used New Exploit Kit to Compromise Thousands of iPhones Your email has been sent An iOS exploit framework has revealed how advanced mobile attack tools can move rapidly from surveillance ...
Lockdown mode is looking increasingly necessary, although Apple has secured its systems against this iPhone-hacking exploit in iOS 26. A new iPhone-hacking exploit has exposed the uncomfortable truth ...
What we know so far: A powerful iOS exploit framework that once appeared to sit in the orbit of government surveillance work is now being reused in criminal schemes to drain cryptocurrency wallets and ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results