Apple iOS update screen is seen displayed on a phone screen in this illustration photo taken in Krakow, Poland on Sept. 17, 2025. (Photo by Jakub Porzycki/NurPhoto)
Cybersecurity researchers say the GitHub leak threatens to "democratize" iPhone exploits that were once reserved for nation-states, potentially putting hundreds of millions of iOS 18 devices at…
WASHINGTON, DC – MARCH 20: Federal Communications Commission (FCC) Chairman Brendan Carr (R) speaks with Sen. Dan Sullivan (R-AK) after attending the presentation of the Commander-in-Chief trophy in the East Room of the White House March 20, 2026 in Washington, DC. U.S. President Donald Trump presented the Commander-in-Chief Trophy to the Navy Midshipmen football team, the winner of the 2025 Army-Navy football game. (Photo by Chip Somodevilla/Getty Images)
The choice to ban all foreign-made routers instead of targeting known risks could create legal and supply chain disruptions with unclear national security returns.
This picture taken on October 5, 2020 shows the logo of mobile messaging and call service telegram on a tablet screen in Toulouse, southwestern France.
(Photo by LIONEL BONAVENTURE/AFP via Getty Images)
PALM BEACH, FLORIDA – NOVEMBER 18: A U.S. Secret Service robot dog manufactured by Boston Dynamics patrols the grounds at President-elect Donald Trump’s Mar-a-Lago resort on November 18, 2024 in Palm Beach, Florida. The incoming Trump administration continues to announce nominees to fill senior positions in his cabinet and government. (Photo by Scott Olson/Getty Images)
A corporate logo for Microsoft hangs above the door to its office building on 8th Avenue on June 24, 2025, in New York City. (Photo by Gary Hershorn/Getty Images)
Then-Millenium challenge corporation CEO Sean Cairncross speaks during a ceremony on Aug. 5, 2019 at the presidential palace in Abidjan. (Photo by ISSOUF SANOGO / AFP) (Photo credit should read ISSOUF SANOGO/AFP via Getty Images)
The national cyber director is pitching an approach that blends cyber operations with diplomacy, law enforcement and pressure on CEOs to shore up their organizations.
The vendor said it’s not aware of any active exploitation of the vulnerabilities, which could allow remote attackers to achieve root access and execute code.