In a new revelation, millions of iOS and macOS applications have been found vulnerable to a security breach that could be leveraged for supply-chain attacks. This breach, uncovered by EVA Information ...
Millions of iOS and macOS apps have been exposed to a security breach that could be used for potential supply-chain attacks, says an ArsTechnica report based on research by EVA Information Security.
Security researchers at E.V.A Information Security Ltd. have detailed several vulnerabilities in the CocoaPod dependency manager used in MacOS and iOS applications that, although now patched, left ...
Millions of Apple Applications Were Vulnerable to CocoaPods Supply Chain Attack Your email has been sent The vulnerabilities have since been patched, but had quietly persisted since the CocoaPods ...
The open-source Swift and Objective-C repository, CocoaPods, had multiple vulnerabilities that left millions of iOS and macOS apps exposed to potential attacks for a decade, but it is now patched.
CocoaPods, an open-source dependency manager used in over three million applications coded in Swift and Objective-C, left thousands of packages exposed and ready for takeover for nearly a decade – ...
Although the hole in the CocoaPods tool is now closed, developers are advised to verify there's nothing rotten in the dependencies used in their existing code. Recently patched vulnerabilities in a ...
A series of newly discovered vulnerabilities in a widely used open source software utility could spell big trouble for large parts of the iOS and MacOS ecosystems. The bugs in question could impact ...
A key tool used primarily in iOS and macOS app development was vulnerable in a way that opened up millions of Mac apps to supply chain attacks, experts have warned. Cybersecurity researchers EVA ...
Security researchers at E.V.A Information Security have uncovered several critical vulnerabilities in CocoaPods, a popular dependency manager for Swift and Objective-C projects. These vulnerabilities ...
Still, the developers of CocoaPods can’t say for sure if hackers ever exploited the flaws to secretly make changes to any affected apps. “This touches code which has been in trunk (the centralized ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results