DarkSword iOS Exploit Chain: Six CVEs, Three Zero-Days, Full Device Takeover
DarkSword is a full-chain iOS exploit kit using six CVEs—three zero-days—to silently take over iPhones running iOS 18.4–18.6.2. Patch to iOS 18.7.7 now.
DarkSword is a full-chain iOS exploit kit using six CVEs—three zero-days—to silently take over iPhones running iOS 18.4–18.6.2. Patch to iOS 18.7.7 now.
CVE-2026-0073 is a critical zero-click RCE in Android's System component affecting Android 14–16. Google's May 2026 patch fixes the flaw. Update now.
Malwarebytes documents a four-part 2026 FIFA World Cup scam ecosystem already operating: fake $270 US entry visas, unlicensed crypto tokens, counterfeit merchandise, and
DHS has issued hundreds of administrative subpoenas to Google, Meta, Reddit, and Discord to unmask users who criticized ICE online. Google, Meta, and
Russia's GRU Unit 26165 (APT28) has been hacking Western logistics, defense, and tech companies since 2022 using HEADLACE malware, IP cameras, and CVE-2023-23397.
CISA advisory AA25-266A details how CVE-2024-36401, a CVSS 9.8 GeoServer RCE, was exploited at a US federal agency for three weeks before detection.
The BufferZoneCorp campaign used sleeper Ruby gems and Go modules to steal credentials and tamper with GitHub Actions. Detection checklist and CI hardening
Mini Shai-Hulud backdoored SAP CAP, PyTorch Lightning, and Intercom packages on npm and PyPI. Use this checklist to detect compromise and harden your
Trellix confirmed a source code breach. Assess EDR vendor breach downstream risk, audit agent update channels, and decide whether to quarantine.
Attackers are stealing exposed AWS IAM keys to send convincing phishing emails via Amazon SES, bypassing reputation-based filters and SPF/DKIM checks.