iOS exploit chains discovered in the wild

A group of hackers have been using compromised websites to launch watering hole attacks against iPhone users who visit the websites. The attacks also use five different exploit chains and exploit 0-day vulnerabilities that don't require any user interaction.

Continue ReadingiOS exploit chains discovered in the wild