Deep iPhone exploit
2023-12-28 00:48:29.016763+01 by Dan Lyke 2 comments
Huge chain of attacks that included using a PDF to trigger a TrueType font exploit and eventually led to using a memory mapped I/O exploit inside Apple's ARM devices.
2023-12-28 00:48:29.016763+01 by Dan Lyke 2 comments
Huge chain of attacks that included using a PDF to trigger a TrueType font exploit and eventually led to using a memory mapped I/O exploit inside Apple's ARM devices.
[ related topics: Apple Computer Work, productivity and environment Typography Graphic Design iPhone ]
comments in ascending chronological order (reverse):
#Comment Re: Deep iPhone exploit made: 2023-12-29 04:25:03.204406+01 by: Dan Lyke
#Comment Re: Deep iPhone exploit made: 2023-12-29 04:28:32.452935+01 by: Dan Lyke
Kaspersky: Operation Triangulation: The last (hardware) mystery
This is no ordinary vulnerability, and we have many unanswered questions. We do not know how the attackers learned to use this unknown hardware feature or what its original purpose was. Neither do we know if it was developed by Apple or it’s a third-party component like ARM CoreSight.