External Publication
Visit Post

Leaked government-grade iPhone hacking tools now used to steal crypto and data from users

TechSpot | Tech Enthusiasts, Power Users, Gamers March 4, 2026
Source
According to new technical analyses from Google and mobile security firm iVerify, Coruna's technical core comprises five complete exploit chains and 23 distinct iOS vulnerabilities that bypass most of the major software defenses Apple has shipped in versions 13 through 17.2.1, effectively turning a web page into a silent infection... Read Entire Article

Discussion in the ATmosphere

Loading comments...