Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Apple Warns Old iPhone Users of Web Attacks

Apple Warns Old iPhone Users of Web Attacks

Posted on March 27, 2026 By CWS

In a recent move, Apple has begun issuing Lock Screen alerts to users of iPhones and iPads running outdated software versions, warning them about potential web-based exploits. This initiative is aimed at urging users to update their devices to the latest software to safeguard against emerging threats. The news was initially brought to light by MacRumors.

Apple’s Proactive Security Measures

The notifications from Apple highlight the presence of attacks on older iOS versions, encouraging users to install critical updates to secure their devices. This proactive measure follows a support document released by Apple, which emphasized the importance of updating devices to combat newly discovered exploit kits such as Coruna and DarkSword.

These exploit kits have been identified as tools used by various threat actors over the past year to deliver harmful payloads through compromised websites. Coruna targets iOS versions from 13.0 to 17.2.1, while DarkSword focuses on versions 18.4 to 18.7. The urgency of these updates is underscored by their potential to cause significant damage if left unaddressed.

Insights into Exploit Kits

Recent findings from Kaspersky reveal that the Coruna exploit kit is an advancement of the framework used in the sophisticated Operation Triangulation campaign, which utilized zero-click iMessage exploits to target iPhones. This campaign was first discovered in June 2023, highlighting the ongoing evolution and sophistication of these threats.

The origins of these exploit kits remain unclear, though research suggests the existence of an active market for zero-day exploits, which may facilitate their distribution among cybercriminals. The availability of these tools raises concerns about the democratization of exploits, potentially enabling mass exploitation beyond traditional nation-state actors.

Protective Measures and Future Outlook

For users unable to update to a supported iOS version, enabling Lockdown Mode is recommended as a protective measure against malicious web content. Introduced in 2022, Lockdown Mode is available on devices running iOS 16 and later, offering enhanced security features.

In a statement to TechCrunch, Apple reassured users by stating that there have been no known successful spyware attacks on devices with Lockdown Mode enabled. This highlights Apple’s commitment to user security and its ongoing efforts to mitigate potential risks from evolving cyber threats.

As these exploit kits continue to develop, it remains vital for users to stay informed and proactive in updating their devices to ensure the highest level of protection against emerging cyber threats.

The Hacker News Tags:Apple, Coruna, Cybersecurity, DarkSword, Exploits, IOS, iPhone, Lockdown Mode, Operation Triangulation, Security, Spyware, Threat Actors, Update, web-based attacks

Post navigation

Previous Post: Iranian Hackers Breach FBI Director’s Email
Next Post: Windows 11 Update to Block Untrusted Kernel Drivers

Related Posts

Scattered Spider Hijacks VMware ESXi to Deploy Ransomware on Critical U.S. Infrastructure Scattered Spider Hijacks VMware ESXi to Deploy Ransomware on Critical U.S. Infrastructure The Hacker News
WhatsApp Hijacks, MCP Leaks, AI Recon, React2Shell Exploit and 15 More Stories WhatsApp Hijacks, MCP Leaks, AI Recon, React2Shell Exploit and 15 More Stories The Hacker News
Experts Find AI Browsers Can Be Tricked by PromptFix Exploit to Run Malicious Hidden Prompts Experts Find AI Browsers Can Be Tricked by PromptFix Exploit to Run Malicious Hidden Prompts The Hacker News
Entra ID Data Protection: Essential or Overkill? Entra ID Data Protection: Essential or Overkill? The Hacker News
ScarCruft Exploits Zoho WorkDrive for Air-Gapped Network Breach ScarCruft Exploits Zoho WorkDrive for Air-Gapped Network Breach The Hacker News
How Attackers Bypass Synced Passkeys How Attackers Bypass Synced Passkeys The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Lyrie.ai Enhances AI Security with New Protocol
  • Hackers Exploit GitHub with Fake AI Repositories
  • Checkmarx Jenkins Plugin Compromised by TeamPCP
  • Fake Claude Campaign Utilizes PlugX-Like DLL Sideloading
  • Critical cPanel Vulnerability Exploited by Cybercriminals

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Lyrie.ai Enhances AI Security with New Protocol
  • Hackers Exploit GitHub with Fake AI Repositories
  • Checkmarx Jenkins Plugin Compromised by TeamPCP
  • Fake Claude Campaign Utilizes PlugX-Like DLL Sideloading
  • Critical cPanel Vulnerability Exploited by Cybercriminals

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark