A previously unknown hardware feature in Apple’s iPhone System on a Chip (SoC) has been exploited in the advanced persistent threat (APT) “Operation Triangulation” campaign, according to Kaspersky’s Global Research and Analysis Team. The zero-click exploit, first spotted in 2019, is operated via the iMessage app, manipulating the JavaScriptCore library, and exploits vulnerabilities to circumvent iPhone security measures. This poses a risk to user privacy and security, targeting Russian diplomats and private firms, including Kaspersky.
Group-IB’s Threat Intelligence and Defence Centre Equip Undergraduates with Sophisticated Cybersecurity Technologies to Boost Threat Analysis and Enhance Cyber Resilience for Campus Start-ups
Hey there from the heart of the San Francisco Bay Area! It’s an absolute pleasure to have you back again for our chat on some