Operation Triangulation: What You Get When Attack iPhones of Researchers
(securelist.com)
from tedu@inks.tedunangst.com to inks@inks.tedunangst.com on 27 Dec 2023 19:52
https://inks.tedunangst.com/l/5060
from tedu@inks.tedunangst.com to inks@inks.tedunangst.com on 27 Dec 2023 19:52
https://inks.tedunangst.com/l/5060
This presentation was also the first time we had publicly disclosed the details of all exploits and vulnerabilities that were used in the attack. We discover and analyze new exploits and attacks using these on a daily basis, and we have discovered and reported more than thirty in-the-wild zero-days in Adobe, Apple, Google, and Microsoft products, but this is definitely the most sophisticated attack chain we have ever seen.
threaded - newest