Apple Adds PQ3 post-quantum encryption for iMessage

Apple Adds PQ3 post-quantum Encryption for iMessage

Apple has released its new PQ3 (post-quantum) cryptographic protocol, claimed to be the first-ever messaging protocol to reach Level 3 security. Apple announced its cryptographic protocol change in 2019 when it shifted from RSA to...
Apple Critical Zero-day Flaw Exposes iPhones & Macs

Apple Critical Zero-day Flaw Exposes iPhones & Macs

Apple has released its first zero-day vulnerability patch of 2024, which affected several Apple products, including tvOS, iOS, iPadOS, macOS, and Safari. The zero-day is tracked under the CVE ID CVE-2024-23222, and the severity...
Beware! Hackers Attacking Thousands of Users With Fake iCloud Storage Alert

Beware! Hackers Attacking Thousands of Users With Fake iCloud Storage Alert

Since Apple iCloud saves sensitive and personal data like images, emails, and documents, hackers often target Apple iCloud. Breaching iCloud grants hackers access to sensitive information, allowing them to abuse or sell the data for...
New iShutdown scripts enable the detection of spyware infections on iPhones

New iShutdown Scripts Enable Detection of Spyware On iPhones

Malware hunting on iOS devices has been extremely difficult due to the nature of the iOS ecosystem. There were only two methods for conducting forensic investigations on iOS devices: either to examine an encrypted...
LeftoverLocals Attack Let Attackers Steal AI Data From Apple, Qualcomm & AMD GPUs

LeftoverLocals Attack Let Attackers Steal AI Data From Apple, Qualcomm & AMD GPUs

An attacker may be able to steal a significant amount of data from a GPU's memory due to a flaw known as LeftoverLocals that affects several popular GPU brands and models, including AMD, Apple, and...
Apple Urgently Patches Zero-day Flaw Exploited in the Wild

Apple Urgently Patches Zero-day Flaw Exploited in the Wild

Apple has released an emergency security update for patching two actively exploited zero-day vulnerabilities on iOS. The vulnerabilities were discovered earlier this month and are tracked as CVE-2023-42916, and CVE-2023-42917 affected many Apple products. The...
iLeakage – New Attack Let Hackers Steal Emails, Passwords On Apple Safari 

iLeakage – New Attack Let Hackers Steal Emails, Passwords On Apple Safari 

Browser-based timerless speculative execution attacks are a security threat that exploits vulnerabilities in web browsers and CPUs. These attacks do not rely on timing measurements, making them harder to detect.  Their sophistication varies, but they can...
iPhone Zero-Click, Zero-Day Exploited in the Wild to Install Spyware

iPhone Zero-Click, Zero-Day Flaw Exploited in the Wild to Install Malware

Researchers discovered an actively exploited zero-click vulnerability that was part of an exploit chain aimed at deploying NSO Group's Pegasus malware. One of the most potent tools now on the market is Pegasus, which is...
Apple Opens Application for Security Research Device Program

Apple Opens Application for Security Research Device Program

Apple launched the Security Research Device (SRD) program, enabling security researchers to examine the security features of a specially-built hardware variant of the iPhone 14 Pro. Apple Security Bounty is also available for security flaws...
Apple Fixes Zero-day Vulnerabilities Exploited To Attack iPhones, Macs, and iPads

Apple Fixes Zero-day Vulnerabilities Exploited To Attack iPhones, Macs, and iPads

Apple has issued security patches to address zero-day vulnerabilities that have been exploited in attacks against iPhones, Macs, and iPads that seriously affect the digital security of Apple devices. The company claims to be aware...

Recent Posts

CyTwist Launches Advanced Security Solution to identify AI-Driven Cyber Threats in...

CyTwist, a leader in advanced next-generation threat detection solutions, has launched its patented detection engine to combat the insidious rise of AI-generated malware. The cybersecurity...