
Hackers Use iOS Exploit Chains Against iPhone Users
Several privilege escalation exploit chains were discovered in iOS devices by Google’s Threat Analysis Group (TAG) and Project Zero teams. The vulnerabilities were actively used by threat actors who also used compromised websites to carry out watering hole attacks against…