CVE/vulnerability
New iOS Vulnerability Could Brick iPhones with Just One Line of Code
A security researcher has uncovered a critical vulnerability in iOS, Apple's flagship mobile operating system.
The flaw, CVE-2025-24091, which leverages the long-standing but little-known "Darwin notification" system, allows any app-including...
Android
43% of Top 100 Enterprise Mobile Apps Expose Sensitive Data to Hackers
A comprehensive study by zLabs, the research team at Zimperium, has found that over 43% of the top 100 mobile applications used in business...
Android
Beware! Fake Unpaid Tolls Messages Used in Phishing Attack to Steal Login Credentials
A surge in phishing text messages claiming unpaid tolls has been linked to a massive phishing-as-a-service (PhaaS) operation.
These scams, which have been hitting...
Apple
Apple iOS 18.4 Beta 3 Released – What’s New!
Apple released iOS 18.4 Beta 3 on March 10, 2025, for developers, with a build number of 22E5222f.
It seems likely that this beta focuses...
Apple
Trigon: Latest iOS Kernel Exploit Uncovered
A sophisticated kernel exploit leveraging CVE-2023-32434, an integer overflow vulnerability in Apple’s XNU virtual memory subsystem, has been unveiled by security researchers.
Dubbed Trigon, this exploit...
Apple
CISA Warns of Active Exploitation of Apple iOS & iPadOS Vulnerability
The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent advisory warning of active exploitation of a critical security flaw in Apple’s iOS...
Cyber Security News
DeepSeek iOS App Leaks Data to ByteDance Servers Without Encryption
DeepSeek iOS app—a highly popular AI assistant recently crowned as the top iOS app since its January 25 release—has been discovered to transmit sensitive...
Android
Malicious Android & iOS Apps Downloaded Over 242,000 Times, Stealing Crypto Recovery Keys
A sophisticated malware campaign, dubbed SparkCat, has infiltrated Google Play and Apple’s App Store, marking the first known instance of an optical character recognition...
cyber security
Hackers Exploit iOS Settings to Trigger Fake iOS Updates on Hijacked Devices
A sophisticated mobile attack vector involves a deceptive iOS update that masquerades as the legitimate iOS 18, tricking users into installing malicious code.
The persistence...
Android
LightSpy Malware Attacking Android and iOS Users
A new malware known as LightSpy has been targeting Android and iOS users.
This sophisticated surveillance tool raises alarms across the cybersecurity community due to...
Cyber Security News
First Ever iOS Trojan Steals Facial Recognition Data
A novel, very sophisticated mobile Trojan dubbed GoldPickaxe.iOS that targets iOS users exclusively was discovered to collect facial recognition data, intercept SMS, and gather identity documents.
The...