Tagged articles
5 articles
Page 1 of 1
Black & White Path
Black & White Path
Apr 18, 2026 · Information Security

iExploit Lab v1.0: $20K Dark‑Web iOS Exploit Tool Under Scrutiny

A dark‑web listing advertises iExploit Lab v1.0, a purported iOS 13‑17.2 exploit kit priced at $20,000, claiming remote code execution, sandbox escape, privilege escalation, and data theft via a C2 panel, though its authenticity remains unverified.

Remote Code Executiondark webexploit kit
0 likes · 2 min read
iExploit Lab v1.0: $20K Dark‑Web iOS Exploit Tool Under Scrutiny
Black & White Path
Black & White Path
Apr 5, 2026 · Information Security

Alert: 2026 Zero‑Click Spyware Targets iPhone 17 and Android 16

A hacker known as xone9to1 posted on a dark‑web forum a so‑called “Zero‑click RAT” that can silently infect iPhone 17 (iOS 26.2) and Android 16, offering real‑time camera, microphone, wallet theft, and remote control capabilities, while experts debate its authenticity and advise urgent security updates.

Android SecurityCVE-2025-43529Zero-click RAT
0 likes · 5 min read
Alert: 2026 Zero‑Click Spyware Targets iPhone 17 and Android 16
AntTech
AntTech
Aug 31, 2023 · Information Security

In-Depth Analysis of Apple UserFS Architecture, Control Flow, and Vulnerabilities

This article provides a comprehensive examination of Apple’s UserFS, detailing its architecture, mounting and file‑access control flows, exposing three real vulnerabilities (CVE‑2022‑42861, CVE‑2022‑42842, a kernel UAF) and discussing how UserFS reshapes the iOS file‑system security model.

AppleCVEUserFS
0 likes · 14 min read
In-Depth Analysis of Apple UserFS Architecture, Control Flow, and Vulnerabilities
21CTO
21CTO
Sep 22, 2015 · Information Security

What Was XcodeGhost? Inside the 2015 iOS Supply‑Chain Attack and Its Aftermath

The article chronicles the 2015 XcodeGhost incident, detailing how a malicious Xcode version infected dozens of popular iOS apps, the response from Tencent, Apple, and security researchers, and the lessons learned for developers and the broader mobile security community.

App StoreMobile SecurityXcodeGhost
0 likes · 13 min read
What Was XcodeGhost? Inside the 2015 iOS Supply‑Chain Attack and Its Aftermath
Tencent TDS Service
Tencent TDS Service
Sep 19, 2015 · Information Security

Understanding XcodeGhost: How It Operates and How to Detect It

This article explains the XcodeGhost malware that infected iOS developers, detailing its data‑reporting and command‑issuing capabilities, the potential threats it poses on older iOS versions, and practical steps to detect and remove an infected Xcode installation.

DetectionMobile DevelopmentXcodeGhost
0 likes · 6 min read
Understanding XcodeGhost: How It Operates and How to Detect It