iVerify Blog
iVerify Blog

New DarkSword Exploit Confirms Mass iOS Attacks Are Now a Serious, Wide-Spread Business Risk
The DarkSword iOS exploit bypasses MDM and MAM controls, enabling large-scale attacks. Read the executive summary and learn how to protect your organization.

Inside DarkSword: A New iOS Exploit Kit Delivered Via Compromised Legitimate Websites
Shortly after our publication on the Coruna exploit kit, a collaborating researcher at Lookout flagged a suspicious-looking URL possibly related to the threat actor from Russia linked with Coruna.

Coruna iOS Exploit: How to Detect and Prevent Infection
iPhones running iOS 13–17.2.1 are at risk. Here's what Coruna does, why it matters, and the steps you can take to detect and defend against it.

Coruna: Inside the Nation-State-Grade iOS Exploit Kit We've Been Tracking

Oblivion RAT - An Android Spyware Platform With a Built-In APK Factory

With iOS 26.2 Release, Apple Reverses Course on Shutdown.log

Breaking Down ZeroDayRAT - New Spyware Targeting Android and iOS

How Attackers Run Smishing Campaigns (And Why They Work)

iVerify Extends Cloudflare Integrations With WARP

Mobile Is the New Initial Access Vector for Financial Institutions

Meet Cellik - A New Android RAT With Play Store Integration

Intellexa’s Predator Exploit Chain: New Details Emerge After Google Publishes Samples

Spyware Doesn’t Take Holidays.

iVerify Enterprise Is Now Integrated with Microsoft Intune

The Attack Surface in Your Pocket—and How Scattered Spider Socially Engineers Their Way Inside

New DarkSword Exploit Confirms Mass iOS Attacks Are Now a Serious, Wide-Spread Business Risk

Inside DarkSword: A New iOS Exploit Kit Delivered Via Compromised Legitimate Websites

Coruna iOS Exploit: How to Detect and Prevent Infection

Coruna: Inside the Nation-State-Grade iOS Exploit Kit We've Been Tracking

Oblivion RAT - An Android Spyware Platform With a Built-In APK Factory

With iOS 26.2 Release, Apple Reverses Course on Shutdown.log

Breaking Down ZeroDayRAT - New Spyware Targeting Android and iOS

How Attackers Run Smishing Campaigns (And Why They Work)

iVerify Extends Cloudflare Integrations With WARP

Mobile Is the New Initial Access Vector for Financial Institutions

Meet Cellik - A New Android RAT With Play Store Integration

Intellexa’s Predator Exploit Chain: New Details Emerge After Google Publishes Samples