iOS exploit chains discovered in the wild
A group of hackers have been using compromised websites to launch watering hole attacks against iPhone users who visit the websites. The attacks also use five different exploit chains and exploit 0-day vulnerabilities that don’t require any user interaction.
iOS exploit chains discovered in the wild Read More »