Products

Solutions

Partners

Resources

Company

Request Demo

Products

Solutions

Partners

Resources

Company

Request Demo

Inside DarkSword: A New iOS Exploit Kit Delivered Via Compromised Legitimate Websites

Inside DarkSword: A New iOS Exploit Kit Delivered Via Compromised Legitimate Websites

Research

Apr 17, 2025

Abusing Data in the Middle: Surveillance Risks in China’s State-Owned Mobile Ecosystem

Aug 15, 2024

iVerify Discovers Android Vulnerability Impacting Millions of Pixel Devices Around the World

Jul 31, 2024

New Fileless Malware Framework "GhostHook" Targets Android Devices

Mar 25, 2024

Clipping Wings: Our Analysis of a Pegasus Spyware Sample

More Blogs

a sword piecing through a mobile phone

Mar 19, 2026

New DarkSword Exploit Confirms Mass iOS Attacks Are Now a Serious, Wide-Spread Business Risk

See the hidden risks associated with phone number leaks and the increasing threat posed by SIM swapping attacks. Learn how to protect your mobile device against dangerous cyber threats with the help of iVerify's Mobile EDR solution.

alt=""

Mar 18, 2026

Inside DarkSword: A New iOS Exploit Kit Delivered Via Compromised Legitimate Websites

See the hidden risks associated with phone number leaks and the increasing threat posed by SIM swapping attacks. Learn how to protect your mobile device against dangerous cyber threats with the help of iVerify's Mobile EDR solution.

a sword piecing through a mobile phone

Mar 12, 2026

Coruna iOS Exploit: How to Detect and Prevent Infection

See the hidden risks associated with phone number leaks and the increasing threat posed by SIM swapping attacks. Learn how to protect your mobile device against dangerous cyber threats with the help of iVerify's Mobile EDR solution.

Products

iVerify Enterprise

RASP SDK

Threat Intelligence

Incident Response

Solutions

BYOD Protection

Location Insights

Smishing Protection

Vulnerability Management

Company

About

Press Releases

In the News

Careers

Request Demo

Sign in

iVerify.org

Events

Learn

Blog

Research

Resources

iVerify Basic

FAQ

Trust Center

Privacy Matters

Docs

Privacy Policy

Products

iVerify Enterprise

RASP SDK

Threat Intelligence

Incident Response

Solutions

BYOD Protection

Location Insights

Smishing Protection

Vulnerability Management

Company

About

Press Releases

In the News

Careers

Request Demo

Sign in

iVerify.org

Events

Learn

Blog

Research

Resources

iVerify Basic

FAQ

Trust Center

Privacy Matters

Docs

Privacy Policy

Products

iVerify Enterprise

RASP SDK

Threat Intelligence

Incident Response

Solutions

BYOD Protection

Location Insights

Smishing Protection

Vulnerability Management

Company

About

Press Releases

In the News

Careers

Request Demo

Sign in

iVerify.org

Events

Learn

Blog

Research

Resources

iVerify Basic

FAQ

Trust Center

Privacy Matters

Docs

Privacy Policy