Advertisement Β· 728 Γ— 90

Posts by

4/4 This is where virtualized platforms like @corellium.bsky.social solve the problem. Jailbroken environments for iOS 18-26. Full system access without waiting for exploits that'll never show up.
2026 is forcing everyone to choose. There's gotta be a better way. #Corellium

4 months ago 0 0 0 0

3/4 Physical jailbreaks aren't coming back. Exploits sell for millions now. Nobody's releasing free public tools anymore. That era is done.
Your only options: test on old iOS versions you can jailbreak, or ship on new iOS you can't verify. Both suck. #PenTesting #iOSSecurity

4 months ago 0 0 1 0

2/4 So now we're stuck:
Production apps run on iOS 18+

Security teams test on iOS 16 (last jailbreakable version)
The gap keeps growing. Banking apps requiring iOS 18. Healthcare dropping iOS 17 support. Security teams still can't test properly. #MobileSecurity

4 months ago 0 0 1 0
Post image

1/4 iOS SECURITY TESTING IN 2026: WE HAVE A PROBLEM
Companies are pushing apps requiring iOS 18 minimum. Sounds good for security, right?
Except there's no public jailbreak for iOS 18. Without it, you can't do real security testing. No root access. No runtime checks. #AppSec

4 months ago 0 0 1 0
Preview
GitHub - sensepost/objection: πŸ“± objection - runtime mobile exploration πŸ“± objection - runtime mobile exploration. Contribute to sensepost/objection development by creating an account on GitHub.

5/5
Link to Objection: github.com/sensepost/ob...
#iOS #iOSSecurity #Objection #Frida #Corellium #MobileSecurity #AppSec #Pentesting

4 months ago 0 0 0 0

4/5
Saved me a bunch of setup time. If you're into iOS security testing, this setup is pretty solid. The new Frida 17.x support in this release makes everything way more stable too.

4 months ago 0 0 1 0
Post image

3/5
The nice part? I didn't need to mess around with physical devices. Just spun up a virtual iOS environment on @corellium.bsky.social and got straight to testing.

4 months ago 0 0 1 0

2/5
For anyone not familiar, Objection basically lets you:
Bypass SSL pinning
Dump keychains
Handle memory dumps and patches
Play around with heap objects

4 months ago 0 0 1 0

1/5
Quick update - Objection just dropped version 1.12.2 with Frida 17.x support, so I had to test it out right away!
Got it running with iOS 26.x on my Corellium device and everything's working smooth.

4 months ago 0 0 1 0

8/8
2026 will separate the teams who adapted from those who didn't.
The gap between attackers and defenders is growing. Fast.
#mobilesecurity #fraud #deepfake #appsec #fintech #cybersecurity #AI #corellium

4 months ago 0 0 0 0
Advertisement
Post image

7/8
Virtualized testing environments like @corellium.bsky.social let teams catch up:
Test liveness detection against deepfakes. Validate SDK behavior at runtime. Inspect actual iOS versions before attackers do.
Real devices. Real exploits. Real validation.

4 months ago 0 0 1 0

6/8
Most security teams are still testing on iOS 16 or relying on static analysis alone.
That's not a strategy. That's a countdown.

4 months ago 0 0 1 0

5/8
The real problem:
Three years without jailbreak-based testing means teams can't verify their defenses work on iOS 17, 18, or 26.
Attackers need to find one vulnerability. Defenders can't prove they've closed any.

4 months ago 0 0 1 0

4/8
What's coming in 2026:
AI-powered mobile malware using LLMs to find zero-days faster than security teams can patch them.
Supply chain attacks through third-party SDKs up 40% in 2025 and accelerating.
API abuse with mobile apps as the entry point to cloud infrastructure.

4 months ago 0 0 1 0

3/8
More from Hong Kong: Forged IDs plus AI-generated selfies opened real bank accounts for money laundering operations.
This wasn't theoretical research. These were live attacks on production systems.
And they worked.

4 months ago 2 0 1 0

2/8
What happened in 2025:
Indonesia: 1,000+ fraudulent loan apps using AI-generated faces and deepfake videos bypassed mobile KYC systems.
Hong Kong: Criminal syndicates used face-swap deepfakes to pass video KYC on finance platforms. Loans approved before anyone noticed.

4 months ago 0 0 1 0

1/8
2025 showed us what AI-powered mobile fraud looks like.2026 will show us what happens when defenders can't keep up. Here's what's coming 🧡

4 months ago 0 0 1 0
Post image

5/5
With @corellium.bsky.social's virtualized mobile environments, security teams can test liveness detection against synthetic inputs, simulate camera manipulation attacks, and run automated fraud scenarios at scale before attackers exploit them.
#corellium

5 months ago 0 0 0 0
Advertisement

4/5
How do you test if your app can distinguish between real faces and AI-generated ones? You need runtime access to test device sensors, manipulate camera inputs, and simulate these attack scenarios before fraudsters do.

5 months ago 0 0 1 0

3/5
This wasn't state-sponsored. This was loan fraud at scale using readily available AI tools. If microloan apps are getting hit with deepfakes, every mobile app with identity verification is vulnerable.
#appsec #cybersecurity

5 months ago 0 0 1 0

2/5
A mobile loan app faced a wave of attacks using deepfake videos to bypass their selfie verification. Attackers exploited weak liveness detection and basic face matching. Many fraudulent applications got through before the pattern was detected.
#KYC #fintech

5 months ago 1 0 1 0

1/5
Deepfake attacks just bypassed mobile KYC in Indonesia. Over 1,000 fraudulent loan applications using AI-generated faces and synthetic videos. The mobile apps couldn't tell the difference.
#mobilesecurity #fraud #deepfake

5 months ago 0 0 1 0
LinkedIn This link will take you to a page that’s not on LinkedIn

6/6
Register here: www.corellium.com/mobile-secur...
This webinar is part of Corellium's Change What's Possible series.
#appsec #corellium #mobilesecurity #CyberSecurity

5 months ago 0 0 0 0

5/6
Join me November 12th at 5pm ET for a webinar on what this means for your mobile security program in 2026. We'll cover the iOS visibility blackout, compliance challenges, and what's next for mobile AppSec.

5 months ago 0 0 1 0

4/6
Without visibility into runtime behavior and exploit paths, how do you validate your app's security posture? Traditional mobile security testing methods are becoming obsolete.

5 months ago 0 0 1 0

3/6
The FORCEDENTRY exploit allowed remote compromise of fully patched iPhones through malicious PDFs. These attacks succeeded because defenders couldn't see what was happening at runtime

5 months ago 0 0 1 0

2/6
This isn't theoretical. Real incidents prove the cost.
Operation Triangulation in 2023 used a chain of iOS zero-days to install malware via iMessage. It went undetected for years.

5 months ago 0 0 1 0
Advertisement

1/6
iOS security testing just hit a wall. For the first time, there are no public jailbreaks for current iOS versions. Security teams that relied on them for runtime analysis are now operating blind.

5 months ago 0 0 1 0

7/7
Knowing 40,000 vulnerabilities exist isn't useful.
Knowing which 5 actually threaten your app? That's everything.
The signal matters more than the noise.

#appsec #corellium #mobilesecurity #PenTesting

5 months ago 0 0 0 0

6/7
@corellium.bsky.social research demonstrates virtualized testing as the path forward:
Spin up iOS devices with full system access. Reproduce the actual exploit. See if it works in YOUR app.
Test before shipping, not after the breach.

5 months ago 0 0 1 0