
Apple releases security fix for older iPhones and iPads to protect against DarkSword attacks
The security update protects a raft of older iPhones and iPads from attacks linked to leaked hacking tools called DarkSword.
Source FileReal-time disclosures, zero-day alerts, and threat intelligence filtered for security leaders.

The security update protects a raft of older iPhones and iPads from attacks linked to leaked hacking tools called DarkSword.
Source File
A new Android malware named NoVoice was found on Google Play, hidden in more than 50 apps that were downloaded at least 2.3 million times. [...]
Source File
Mark Lanier, the folksy Texas litigator who doubles as a part-time pastor, held a jar of M&Ms in front of the Los Angeles jury and told them that each one represented a billion dollars of Meta’s market capitalisation. There were, by that maths, roughly 1,400 …
Source File
Somewhere in Hasbro’s network, someone was where they should not have been. The $14.4 billion toy and entertainment conglomerate, owner of Peppa Pig, Transformers, Monopoly, Dungeons & Dragons, Nerf, Play-Doh, and Power Rangers ,disclosed on Wednesday that it…
Source File
The Meta-owned company said it identified around 200 users who were tricked into installing a fake version of WhatsApp that was actually Italian-made spyware.
Source File
A Windows utility tool was found vulnerable to a critical flaw that enabled RCE, DoS, and other risks.
Source File
Misconfigured AI agents can lead to data disclosure and other risks.
Source File
The American toymaking giant noted that it was continuing to "implement measures to secure its business operations," suggesting that the hackers may still be in the company's systems.
Source File
Cybercriminals are impersonating top brands like Meta, Disney, and Spotify in a highly sophisticated new phishing campaign designed to hijack your Facebook account. Here is everything you need to know to stay safe.
Source File
The launch of NIST’s AI Agent Standards Initiative marks a pivotal moment in AI cybersecurity.
Source File
North Korean hackers used an updated version of a known backdoor to target a popular npm package.
Source File
Modern intrusions increasingly start with valid credentials and routine access, not exploits. Blackpoint Cyber's upcoming threat report shows how VPN abuse, RMM tools, and social engineering drive most incidents. [...]
Source File