Researchers investigate the use of fraudulent iOS updates by malicious actors to establish persistent access to compromised devices by comprehensively analyzing the attack lifecycle,...
A red team exercise identified critical vulnerabilities in CocoaPods, a popular dependency manager for iOS and macOS projects, which could allow attackers to compromise...