TECH&SPACE
LIVE FEEDMC v1.0
HR
// STATUS
ISS420 kmCREW7 aboardNEOs0 tracked todayKp0FLAREB1.0LATESTBaltic Whale and Fehmarn Delays Push Scandlines Toward Faste...ISS420 kmCREW7 aboardNEOs0 tracked todayKp0FLAREB1.0LATESTBaltic Whale and Fehmarn Delays Push Scandlines Toward Faste...
// INITIALIZING GLOBE FEED...
Technologydb#2459

Leaked iPhone hacking tool exposes Apple’s zero-click blind spot

(1w ago)
Melbourne, Florida, United States
techcrunch.com
Leaked iPhone hacking tool exposes Apple’s zero-click blind spot

Leaked iPhone hacking tool exposes Apple’s zero-click blind spot📷 Published: Apr 13, 2026 at 04:24 UTC

  • DarkSword exploit leaks, no patch in sight
  • Zero-click attacks bypass all user defenses
  • Security researchers vs. Apple’s slow response cycle

Security researchers have uncovered two advanced iPhone hacking tools—Coruna and DarkSword—with the latter now circulating online. Unlike garden-variety malware, these tools reportedly enable zero-click exploits, meaning users don’t even need to tap a link to get compromised. The leak suggests attackers may already be probing vulnerabilities in iOS versions that Apple hasn’t patched—or perhaps can’t patch without breaking core functionality.

Apple’s ecosystem has long traded on its reputation for security, but this leak underscores a growing tension: the company’s slow patch cycles clash with the speed at which exploits spread. While Coruna remains under wraps, DarkSword’s public availability means hackers now have a blueprint to reverse-engineer attacks. Early signals suggest these tools target high-value individuals—journalists, executives, activists—but the leak democratizes the risk.

The practical impact is immediate. Users with unpatched devices (and that’s most of them) face invisible threats. Unlike Android’s fragmented update system, Apple controls iOS updates centrally—yet even that hasn’t prevented this gap. The question isn’t whether your iPhone is vulnerable, but whether the exploit has already been weaponized against you.

The gap between discovery and protection just got wider

The gap between discovery and protection just got wider📷 Published: Apr 13, 2026 at 04:24 UTC

The gap between discovery and protection just got wider

For enterprises and governments, this leak is a five-alarm fire. Zero-click exploits undermine mobile device management (MDM) tools, which assume the OS itself is secure. If DarkSword’s capabilities include persistent access—say, via iMessage or iCloud sync—IT teams may need to rethink their entire security posture. The MITRE ATT&CK framework doesn’t even fully catalog these kinds of iOS-specific threats yet.

Apple’s response will be scrutinized. The company has historically downplayed similar vulnerabilities until forced into action by public pressure or lawsuits. This time, the leak’s visibility may accelerate a fix—but the damage is already spreading. Forum chatter among security researchers, per TechCrunch’s reporting, suggests Coruna could be even more sophisticated. If that tool leaks next, we’re looking at a cascade failure of iOS trust.

The real bottleneck isn’t the exploit itself, but Apple’s opacity. Without clear disclosure timelines or bug bounty transparency, users and admins are flying blind. The company’s walled garden only works if the walls hold.

iPhoneAppleCybersecurityHacking
// liked by readers

//Comments