Close Menu
TechTost
  • AI
  • Apps
  • Crypto
  • Fintech
  • Hardware
  • Media & Entertainment
  • Security
  • Startups
  • Transportation
  • Venture
  • Recommended Essentials
What's Hot

Apple made strides with iOS 26 security, but leaked hacking tools still leave millions exposed to spyware attacks

Conntour Raises $7M From General Catalyst, YC To Build AI Search Engine For Security Video Systems

A little-known Croatian startup is coming to the robotaxi market with the help of Uber

Facebook X (Twitter) Instagram
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
  • Disclaimer
Facebook X (Twitter) Instagram
TechTost
Subscribe Now
  • AI

    A ‘pound of flesh’ from data centers: a senator’s response to AI job losses

    26 March 2026

    Mercor competitor Deccan AI raises $25 million, India experts report

    26 March 2026

    With Sift Stack, two former SpaceX engineers are bringing the software that helped launch rockets to the factory

    25 March 2026

    OpenAI’s Sora was the creepiest app on your phone — now it’s shutting down

    25 March 2026

    Mirage raises $75M to continue building models for AI video editing app Captions

    24 March 2026
  • Apps

    WhatsApp can now design AI-generated replies based on your conversations

    26 March 2026

    Apple overhauls its app developer platform with 100 new metrics, more tools

    26 March 2026

    Talat’s AI meeting notes stay on your computer, not in the cloud

    25 March 2026

    Spotify is testing new tool to prevent artificial intelligence from attributing real artists

    25 March 2026

    Pinterest is launching a new feature for promoting a Pin

    24 March 2026
  • Crypto

    Hackers stole over $2.7 billion in crypto in 2025, data shows

    23 December 2025

    New report examines how David Sachs may benefit from Trump administration role

    1 December 2025

    Why Benchmark Made a Rare Crypto Bet on Trading App Fomo, with $17M Series A

    6 November 2025

    Solana co-founder Anatoly Yakovenko is a big fan of agentic coding

    30 October 2025

    MoviePass opens Mogul fantasy league game to the public

    29 October 2025
  • Fintech

    Doss raises $55 million for AI inventory management that connects to ERP

    24 March 2026

    Despite stiff competition, Kalshi, Polymarket CEOs back $35m VC fund projections

    23 March 2026

    Amid legal turmoil, Kalshi is temporarily banned in Nevada

    20 March 2026

    Nominations for the Startup Battlefield 200 are still open

    19 March 2026

    Kalshi’s legal woes pile up as Arizona files first criminal charges for ‘illegal gambling operation’

    17 March 2026
  • Hardware

    Arm releases the first in-house chip in its 35-year history

    24 March 2026

    Ultrahuman boosts US push with Ring Pro as Oura tightens its grip

    24 March 2026

    Amazon is working on a new smartphone with Alexa at its core, the report says

    20 March 2026

    CEO Carl Pei says nothing about smartphone apps disappearing as they’re replaced by artificial intelligence agents

    18 March 2026

    MacBook Neo, AirPods Max 2, iPhone 17e and everything else Apple announced this month

    18 March 2026
  • Media & Entertainment

    Spotify’s new SongDNA feature maps how your favorite songs are connected

    26 March 2026

    Roku’s Howdy $3 subscription service launches on Prime Video

    25 March 2026

    Apple Music partners with Ticketmaster to boost concert discovery

    25 March 2026

    Google TV’s new Gemini features keep fans updated on sports teams and more

    24 March 2026

    Tubi joins forces with popular TikTokers to create original streaming content

    19 March 2026
  • Security

    Apple made strides with iOS 26 security, but leaked hacking tools still leave millions exposed to spyware attacks

    26 March 2026

    Convicted spyware boss hints Greek government was behind dozens of phone hacks

    26 March 2026

    Someone has publicly leaked an exploit kit that can hack millions of iPhones

    25 March 2026

    The FCC bans the importation of new consumer routers made abroad, citing security risks

    25 March 2026

    Crunchyroll confirms data breach after hackers claim unauthorized access

    24 March 2026
  • Startups

    Conntour Raises $7M From General Catalyst, YC To Build AI Search Engine For Security Video Systems

    26 March 2026

    Delve Made Security Compliant on LiteLLM, an AI Project Hit by Malware

    26 March 2026

    After spin-off, Y Combinator grad Glimpse raises $35 million led by a16z

    25 March 2026

    Databricks has bought two startups to support its new AI security product

    25 March 2026

    Insight Partners removes investment post for Delve amid ‘false compliance’ claims.

    24 March 2026
  • Transportation

    A little-known Croatian startup is coming to the robotaxi market with the help of Uber

    26 March 2026

    Harbinger’s next product will be hybrid emergency vehicles

    25 March 2026

    Flighty’s new update gives you real-time alerts for airport disruptions

    25 March 2026

    Zoox is bringing its robotaxis to Austin and Miami

    24 March 2026

    Zipline raises another $200 million to fuel drone delivery expansion

    24 March 2026
  • Venture

    BKR Capital Raises $14.5M (So Far) to Invest in Black Founders

    26 March 2026

    Driving GLP-1 Boom, VITL Raises $7.5M to Repair Cash Clinic Prescribing

    26 March 2026

    Arinna raises $4 million to solve the space energy problem

    25 March 2026

    Accel, Prosus select six ‘off-the-map’ startups for inaugural India team

    25 March 2026

    Startup Gimlet Labs solves the AI ​​inference problem in a surprisingly elegant way

    24 March 2026
  • Recommended Essentials
TechTost
You are at:Home»Security»Apple made strides with iOS 26 security, but leaked hacking tools still leave millions exposed to spyware attacks
Security

Apple made strides with iOS 26 security, but leaked hacking tools still leave millions exposed to spyware attacks

techtost.comBy techtost.com26 March 202604 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Email
Apple Made Strides With Ios 26 Security, But Leaked Hacking
Share
Facebook Twitter LinkedIn Pinterest Email

The common assumption among iPhone security experts was that finding vulnerabilities and developing exploits for iOS was difficult, requiring a lot of time, resources and teams of skilled researchers to overcome its security defense layers. This meant that iPhone spyware and zero-day vulnerabilities, which are not known to the software vendor before being exploited, were rare and only used in limited and targeted attacks. as Apple itself says.

However, in the past month, cybersecurity researchers at Google, iVerify and Lookout have documented several large-scale hacking campaigns using tools known as Coruna and DarkSword, which target almost indiscriminate victims around the world who are not yet using Apple’s most up-to-date software. Some of the hackers behind these attacks include Russian spies and Chinese cybercriminals and target their victims through hacked websites or fake pages, allowing them to potentially steal phone data from a large number of victims.

Now, some of these tools have leaked online, allowing anyone to take the code and easily launch their own attacks against Apple users running older versions of iOS.

Apple has invested significant resources in new security and development technologies, such as introducing memory security code for its latest iPhone models and releasing features such as Lockdown Mode specifically to counter potential spyware attacks. The goal was to make modern iPhones more secure and reinforce the claim that the iPhone is very hard to hack.

However, there are still many older, outdated iPhones that are now easier targets for spies and cybercriminals using spyware.

There are now essentially two categories of iPhone user security.

Users of the latest iOS 26 running on the latest iPhone 17 models released in 2025 have a new security feature called Memory Integrity Enforcement, which is designed to stop memory corruption errors, some of the most commonly exploited flaws used in spyware and phone unlocking attacks. DarkSword relied heavily on memory corruption bugs, according to Google.

Then there are iPhone users that are still running the previous version of Apple’s mobile software, iOS 18, or even older versions, which were vulnerable to memory-based hacks and other exploits in the past.

Contact us

Do you have more information about DarkSword, Coruna, or other government hacking and spyware tools? From a non-working device, Lorenzo Franceschi-Bicchierai can be reached securely on Signal at +1 917 257 1382 or via Telegram, Keybase and Wire @lorenzofb or via email.

The discovery of Coruna and DarkSword suggests that memory-based attacks could continue to plague users of older iPhones and iPads that lag behind newer, more memory-secure models.

Experts working for iVerify and Lookout, two cybersecurity firms that have a commercial stake in selling mobile security products, Coruna and DarkSword say, may also challenge the long-held assumption that iPhone hacks are rare.

iVerify co-founder Matthias Frielingsdorf told TechCrunch that mobile attacks are now “widespread,” but also said that attacks based on zero-days against the most up-to-date software “will always charge a high price,” implying that they won’t be used to hack people on a large scale.

Patrick Wardle, an Apple security expert, said one problem is that people call iPhone attacks rare or sophisticated just because they’re rarely documented. But the reality, he said, is that these attacks may be out there, but they’re not always caught.

“Calling them ‘highly advanced’ is a bit like calling tanks or missiles advanced,” Wardle told TechCrunch. “True, but it misses the point. This is just the basic skill at this level, and all (most) nations have it (or can get it at the right price).”

Another problem highlighted by Coruna and DarkSword is that there is now a seemingly thriving “second-hand” market, which creates the financial incentive “for exploit developers and individual brokers to essentially get paid twice for the same exploit,” according to Justin Albrecht, principal researcher at Lookout.

Especially when the original exploit is patched, it makes sense for brokers to resell it before updating everyone.

“This is not a one-time event, but rather a sign of things to come,” Albrecht told TechCrunch.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleConntour Raises $7M From General Catalyst, YC To Build AI Search Engine For Security Video Systems
bhanuprakash.cg
techtost.com
  • Website

Related Posts

Conntour Raises $7M From General Catalyst, YC To Build AI Search Engine For Security Video Systems

26 March 2026

Convicted spyware boss hints Greek government was behind dozens of phone hacks

26 March 2026

Delve Made Security Compliant on LiteLLM, an AI Project Hit by Malware

26 March 2026
Add A Comment

Leave A Reply Cancel Reply

Don't Miss

Apple made strides with iOS 26 security, but leaked hacking tools still leave millions exposed to spyware attacks

26 March 2026

Conntour Raises $7M From General Catalyst, YC To Build AI Search Engine For Security Video Systems

26 March 2026

A little-known Croatian startup is coming to the robotaxi market with the help of Uber

26 March 2026
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Fintech

Doss raises $55 million for AI inventory management that connects to ERP

24 March 2026

Despite stiff competition, Kalshi, Polymarket CEOs back $35m VC fund projections

23 March 2026

Amid legal turmoil, Kalshi is temporarily banned in Nevada

20 March 2026
Startups

Conntour Raises $7M From General Catalyst, YC To Build AI Search Engine For Security Video Systems

Delve Made Security Compliant on LiteLLM, an AI Project Hit by Malware

After spin-off, Y Combinator grad Glimpse raises $35 million led by a16z

© 2026 TechTost. All Rights Reserved
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
  • Disclaimer

Type above and press Enter to search. Press Esc to cancel.