<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Coruna and DarkSword iOS Exploits: How Check Point Mobile Security Helps Mitigate Enterprise Risk in Mobile</title>
    <link>https://community.checkpoint.com/t5/Mobile/Coruna-and-DarkSword-iOS-Exploits-How-Check-Point-Mobile/m-p/277166#M1330</link>
    <description>&lt;DIV id="solution"&gt;
&lt;DIV&gt;
&lt;P&gt;&lt;STRONG&gt;Table of Contents&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;DIV class="checkpoint_navigate"&gt;Overview&lt;/DIV&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;DIV class="checkpoint_navigate"&gt;What Is Coruna?&lt;/DIV&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;DIV class="checkpoint_navigate"&gt;What Makes DarkSword Different?&lt;/DIV&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;DIV class="checkpoint_navigate"&gt;Apple Security Response&lt;/DIV&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;DIV class="checkpoint_navigate"&gt;How Check Point Mobile Security Helps Mitigate These Exploits&lt;/DIV&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;DIV class="checkpoint_navigate"&gt;Conclusion&lt;/DIV&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;DIV class="checkpoint_toggleAll"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;H2 id="Overview"&gt;Overview&lt;/H2&gt;
&lt;DIV&gt;
&lt;DIV id="Toggle_Overview"&gt;Coruna and DarkSword are advanced iOS exploit frameworks that shift iPhone compromise from rare, highly targeted espionage operations to scalable enterprise-level attacks. Capabilities once limited to intelligence agencies and commercial surveillance vendors are now accessible to a broader threat ecosystem.&lt;BR /&gt;Public leaks of exploit components and JavaScript proof‑of‑concept code have lowered the barrier to exploitation. Threat actors can reuse and share these components across underground communities to launch web‑based attacks. As a result, unpatched iOS devices pose a growing enterprise security concern.&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;H2 id="Coruna"&gt;What Is Coruna?&lt;/H2&gt;
&lt;DIV&gt;
&lt;DIV id="Toggle_Coruna"&gt;
&lt;P&gt;Coruna is a sophisticated exploit framework that targets iPhones and iPads running vulnerable iOS versions. Its reported capabilities include:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Multiple exploit chains covering 20+ vulnerabilities&lt;/LI&gt;
&lt;LI&gt;Web‑based exploit delivery mechanisms&lt;/LI&gt;
&lt;LI&gt;Full device compromise and data exfiltration&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;H2 id="DarkSword"&gt;What Makes DarkSword Different?&lt;/H2&gt;
&lt;DIV&gt;
&lt;DIV id="Toggle_DarkSword"&gt;
&lt;P&gt;Unlike Coruna, which targets older iOS versions, DarkSword targets newer versions, including iOS 18.x. Some attack scenarios require only a single click on a malicious or compromised website, while others approach near zero-click execution.&lt;BR /&gt;DarkSword combines multiple advanced techniques, including:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Zero‑day vulnerabilities&lt;/LI&gt;
&lt;LI&gt;WebKit browser exploitation&lt;/LI&gt;
&lt;LI&gt;Kernel privilege escalation&lt;/LI&gt;
&lt;LI&gt;Sandbox escape techniques&lt;/LI&gt;
&lt;LI&gt;Persistent spyware deployment&lt;/LI&gt;
&lt;/UL&gt;
Once attackers compromise a device, they can potentially steal messages, credentials, and browser data, track device location, capture screenshots, record audio, and execute remote commands. In an enterprise context, this leads to stolen authentication tokens, hijacked SaaS sessions, intercepted MFA approvals, and long‑term surveillance of sensitive communications.&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;H2&gt;&amp;nbsp;&lt;/H2&gt;
&lt;H2 id="Apple_Response"&gt;Apple Security Response&lt;/H2&gt;
&lt;DIV&gt;
&lt;DIV id="Toggle_Apple"&gt;Apple addressed the vulnerabilities associated with Coruna and DarkSword in&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;iOS 18.7.7&lt;/STRONG&gt;, released on April 1, 2026. Apple also introduced visible security warnings within iOS settings to encourage immediate upgrades. The patched vulnerabilities include:&lt;BR /&gt;
&lt;UL&gt;
&lt;LI&gt;CVE‑2026‑20700 — dyld PAC bypass&lt;/LI&gt;
&lt;LI&gt;CVE‑2025‑43529 — JavaScriptCore zero‑day memory corruption&lt;/LI&gt;
&lt;LI&gt;CVE‑2025‑43520 — Kernel memory corruption&lt;/LI&gt;
&lt;LI&gt;CVE‑2025‑43510 — Kernel copy‑on‑write memory management issue&lt;/LI&gt;
&lt;LI&gt;CVE‑2025‑31277 — JavaScriptCore memory corruption&lt;/LI&gt;
&lt;LI&gt;CVE‑2025‑14174 — ANGLE/WebGL memory corruption&lt;/LI&gt;
&lt;/UL&gt;
Devices running older versions (iOS 18.4 through 18.7) remain significantly exposed.&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;H2&gt;&amp;nbsp;&lt;/H2&gt;
&lt;H2 id="Mobile_Security"&gt;How Check Point Mobile Security Helps Mitigate These Exploits&lt;/H2&gt;
&lt;DIV&gt;
&lt;DIV id="Toggle_Mobile_Security"&gt;Traditional Mobile Device Management (MDM) solutions focus on compliance and configuration. However, they do not detect advanced exploit chains that operate entirely in memory or abuse legitimate browser components.&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Check Point Mobile Security&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;provides Mobile Threat Defense (MTD) capabilities that complement traditional device management and patching strategies.&lt;BR /&gt;The following table describes the key risk‑reduction functions provided by Check Point Mobile Security:&lt;BR /&gt;
&lt;DIV class="table-wrapper"&gt;
&lt;TABLE border="1"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD&gt;&lt;STRONG&gt;Function&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;STRONG&gt;Capability&lt;/STRONG&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&lt;STRONG&gt;Enforce secure iOS versions&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD&gt;Administrators can configure policies to:&lt;BR /&gt;
&lt;UL&gt;
&lt;LI&gt;Detect devices running vulnerable iOS versions and automatically raise device risk levels&lt;/LI&gt;
&lt;LI&gt;Alert security teams and restrict access to corporate resources until remediation&lt;/LI&gt;
&lt;/UL&gt;
This accelerates adoption of patched iOS versions such as iOS 18.7.7 and later.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&lt;STRONG&gt;CVE‑based risk visibility&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD&gt;
&lt;UL&gt;
&lt;LI&gt;Provides visibility into devices exposed to vulnerabilities associated with DarkSword and Coruna, including:
&lt;UL&gt;
&lt;LI&gt;CVE‑2026‑20700&lt;/LI&gt;
&lt;LI&gt;CVE‑2025‑43529&lt;/LI&gt;
&lt;LI&gt;CVE‑2025‑43520&lt;/LI&gt;
&lt;LI&gt;CVE‑2025‑43510&lt;/LI&gt;
&lt;LI&gt;CVE‑2025‑31277&lt;/LI&gt;
&lt;LI&gt;CVE‑2025‑14174&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;Enables security teams to identify vulnerable devices, prioritize remediation, and monitor exposure across the mobile fleet.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&lt;STRONG&gt;Protection against web‑based exploitation&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD&gt;DarkSword and Coruna exploit chains rely heavily on malicious web content. Mobile Security helps reduce this exposure by:
&lt;UL&gt;
&lt;LI&gt;Detecting and blocking malicious and phishing websites&lt;/LI&gt;
&lt;LI&gt;Preventing communication with malicious infrastructure&lt;/LI&gt;
&lt;LI&gt;Monitoring abnormal mobile network activity&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;This protection is critical because many iOS exploit chains do not require malicious app installation.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&lt;STRONG&gt;Conditional access enforcement&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD&gt;Integrates with enterprise identity platforms to:
&lt;UL&gt;
&lt;LI&gt;Block vulnerable devices from accessing SaaS applications and corporate email&lt;/LI&gt;
&lt;LI&gt;Prevent authentication from high‑risk mobile endpoints&lt;/LI&gt;
&lt;LI&gt;Enforce remediation before restoring access&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;This limits the impact of compromised devices on enterprise environments.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&lt;STRONG&gt;Real‑time Mobile Threat Defense&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Provides active protection through:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Continuous device risk assessment and runtime threat analysis&lt;/LI&gt;
&lt;LI&gt;Network threat prevention and phishing protection&lt;/LI&gt;
&lt;LI&gt;Zero‑trust mobile access enforcement&lt;/LI&gt;
&lt;/UL&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;H2&gt;&amp;nbsp;&lt;/H2&gt;
&lt;H2 id="Conclusion"&gt;Conclusion&lt;/H2&gt;
&lt;DIV&gt;
&lt;DIV id="Toggle_Conclusion"&gt;
&lt;P&gt;Coruna and DarkSword demonstrate that advanced iOS exploitation is no longer limited to elite threat actors. Patching alone is insufficient; organizations must implement Mobile Threat Defense (MTD) controls such as Check Point Mobile Security, to gain CVE-based risk visibility, web threat protection, and enforce conditional access before attacks impact the enterprise.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;cp&amp;lt;r&amp;gt; reference for more details:&amp;nbsp;&lt;A href="https://research.checkpoint.com/2026/9th-march-threat-intelligence-report/" target="_blank"&gt;https://research.checkpoint.com/2026/9th-march-threat-intelligence-report/&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
    <pubDate>Wed, 20 May 2026 04:54:40 GMT</pubDate>
    <dc:creator>michell</dc:creator>
    <dc:date>2026-05-20T04:54:40Z</dc:date>
    <item>
      <title>Coruna and DarkSword iOS Exploits: How Check Point Mobile Security Helps Mitigate Enterprise Risk</title>
      <link>https://community.checkpoint.com/t5/Mobile/Coruna-and-DarkSword-iOS-Exploits-How-Check-Point-Mobile/m-p/277166#M1330</link>
      <description>&lt;DIV id="solution"&gt;
&lt;DIV&gt;
&lt;P&gt;&lt;STRONG&gt;Table of Contents&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;DIV class="checkpoint_navigate"&gt;Overview&lt;/DIV&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;DIV class="checkpoint_navigate"&gt;What Is Coruna?&lt;/DIV&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;DIV class="checkpoint_navigate"&gt;What Makes DarkSword Different?&lt;/DIV&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;DIV class="checkpoint_navigate"&gt;Apple Security Response&lt;/DIV&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;DIV class="checkpoint_navigate"&gt;How Check Point Mobile Security Helps Mitigate These Exploits&lt;/DIV&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;DIV class="checkpoint_navigate"&gt;Conclusion&lt;/DIV&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;DIV class="checkpoint_toggleAll"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;H2 id="Overview"&gt;Overview&lt;/H2&gt;
&lt;DIV&gt;
&lt;DIV id="Toggle_Overview"&gt;Coruna and DarkSword are advanced iOS exploit frameworks that shift iPhone compromise from rare, highly targeted espionage operations to scalable enterprise-level attacks. Capabilities once limited to intelligence agencies and commercial surveillance vendors are now accessible to a broader threat ecosystem.&lt;BR /&gt;Public leaks of exploit components and JavaScript proof‑of‑concept code have lowered the barrier to exploitation. Threat actors can reuse and share these components across underground communities to launch web‑based attacks. As a result, unpatched iOS devices pose a growing enterprise security concern.&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;H2 id="Coruna"&gt;What Is Coruna?&lt;/H2&gt;
&lt;DIV&gt;
&lt;DIV id="Toggle_Coruna"&gt;
&lt;P&gt;Coruna is a sophisticated exploit framework that targets iPhones and iPads running vulnerable iOS versions. Its reported capabilities include:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Multiple exploit chains covering 20+ vulnerabilities&lt;/LI&gt;
&lt;LI&gt;Web‑based exploit delivery mechanisms&lt;/LI&gt;
&lt;LI&gt;Full device compromise and data exfiltration&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;H2 id="DarkSword"&gt;What Makes DarkSword Different?&lt;/H2&gt;
&lt;DIV&gt;
&lt;DIV id="Toggle_DarkSword"&gt;
&lt;P&gt;Unlike Coruna, which targets older iOS versions, DarkSword targets newer versions, including iOS 18.x. Some attack scenarios require only a single click on a malicious or compromised website, while others approach near zero-click execution.&lt;BR /&gt;DarkSword combines multiple advanced techniques, including:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Zero‑day vulnerabilities&lt;/LI&gt;
&lt;LI&gt;WebKit browser exploitation&lt;/LI&gt;
&lt;LI&gt;Kernel privilege escalation&lt;/LI&gt;
&lt;LI&gt;Sandbox escape techniques&lt;/LI&gt;
&lt;LI&gt;Persistent spyware deployment&lt;/LI&gt;
&lt;/UL&gt;
Once attackers compromise a device, they can potentially steal messages, credentials, and browser data, track device location, capture screenshots, record audio, and execute remote commands. In an enterprise context, this leads to stolen authentication tokens, hijacked SaaS sessions, intercepted MFA approvals, and long‑term surveillance of sensitive communications.&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;H2&gt;&amp;nbsp;&lt;/H2&gt;
&lt;H2 id="Apple_Response"&gt;Apple Security Response&lt;/H2&gt;
&lt;DIV&gt;
&lt;DIV id="Toggle_Apple"&gt;Apple addressed the vulnerabilities associated with Coruna and DarkSword in&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;iOS 18.7.7&lt;/STRONG&gt;, released on April 1, 2026. Apple also introduced visible security warnings within iOS settings to encourage immediate upgrades. The patched vulnerabilities include:&lt;BR /&gt;
&lt;UL&gt;
&lt;LI&gt;CVE‑2026‑20700 — dyld PAC bypass&lt;/LI&gt;
&lt;LI&gt;CVE‑2025‑43529 — JavaScriptCore zero‑day memory corruption&lt;/LI&gt;
&lt;LI&gt;CVE‑2025‑43520 — Kernel memory corruption&lt;/LI&gt;
&lt;LI&gt;CVE‑2025‑43510 — Kernel copy‑on‑write memory management issue&lt;/LI&gt;
&lt;LI&gt;CVE‑2025‑31277 — JavaScriptCore memory corruption&lt;/LI&gt;
&lt;LI&gt;CVE‑2025‑14174 — ANGLE/WebGL memory corruption&lt;/LI&gt;
&lt;/UL&gt;
Devices running older versions (iOS 18.4 through 18.7) remain significantly exposed.&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;H2&gt;&amp;nbsp;&lt;/H2&gt;
&lt;H2 id="Mobile_Security"&gt;How Check Point Mobile Security Helps Mitigate These Exploits&lt;/H2&gt;
&lt;DIV&gt;
&lt;DIV id="Toggle_Mobile_Security"&gt;Traditional Mobile Device Management (MDM) solutions focus on compliance and configuration. However, they do not detect advanced exploit chains that operate entirely in memory or abuse legitimate browser components.&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Check Point Mobile Security&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;provides Mobile Threat Defense (MTD) capabilities that complement traditional device management and patching strategies.&lt;BR /&gt;The following table describes the key risk‑reduction functions provided by Check Point Mobile Security:&lt;BR /&gt;
&lt;DIV class="table-wrapper"&gt;
&lt;TABLE border="1"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD&gt;&lt;STRONG&gt;Function&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;STRONG&gt;Capability&lt;/STRONG&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&lt;STRONG&gt;Enforce secure iOS versions&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD&gt;Administrators can configure policies to:&lt;BR /&gt;
&lt;UL&gt;
&lt;LI&gt;Detect devices running vulnerable iOS versions and automatically raise device risk levels&lt;/LI&gt;
&lt;LI&gt;Alert security teams and restrict access to corporate resources until remediation&lt;/LI&gt;
&lt;/UL&gt;
This accelerates adoption of patched iOS versions such as iOS 18.7.7 and later.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&lt;STRONG&gt;CVE‑based risk visibility&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD&gt;
&lt;UL&gt;
&lt;LI&gt;Provides visibility into devices exposed to vulnerabilities associated with DarkSword and Coruna, including:
&lt;UL&gt;
&lt;LI&gt;CVE‑2026‑20700&lt;/LI&gt;
&lt;LI&gt;CVE‑2025‑43529&lt;/LI&gt;
&lt;LI&gt;CVE‑2025‑43520&lt;/LI&gt;
&lt;LI&gt;CVE‑2025‑43510&lt;/LI&gt;
&lt;LI&gt;CVE‑2025‑31277&lt;/LI&gt;
&lt;LI&gt;CVE‑2025‑14174&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;Enables security teams to identify vulnerable devices, prioritize remediation, and monitor exposure across the mobile fleet.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&lt;STRONG&gt;Protection against web‑based exploitation&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD&gt;DarkSword and Coruna exploit chains rely heavily on malicious web content. Mobile Security helps reduce this exposure by:
&lt;UL&gt;
&lt;LI&gt;Detecting and blocking malicious and phishing websites&lt;/LI&gt;
&lt;LI&gt;Preventing communication with malicious infrastructure&lt;/LI&gt;
&lt;LI&gt;Monitoring abnormal mobile network activity&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;This protection is critical because many iOS exploit chains do not require malicious app installation.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&lt;STRONG&gt;Conditional access enforcement&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD&gt;Integrates with enterprise identity platforms to:
&lt;UL&gt;
&lt;LI&gt;Block vulnerable devices from accessing SaaS applications and corporate email&lt;/LI&gt;
&lt;LI&gt;Prevent authentication from high‑risk mobile endpoints&lt;/LI&gt;
&lt;LI&gt;Enforce remediation before restoring access&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;This limits the impact of compromised devices on enterprise environments.&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&lt;STRONG&gt;Real‑time Mobile Threat Defense&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;Provides active protection through:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Continuous device risk assessment and runtime threat analysis&lt;/LI&gt;
&lt;LI&gt;Network threat prevention and phishing protection&lt;/LI&gt;
&lt;LI&gt;Zero‑trust mobile access enforcement&lt;/LI&gt;
&lt;/UL&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;H2&gt;&amp;nbsp;&lt;/H2&gt;
&lt;H2 id="Conclusion"&gt;Conclusion&lt;/H2&gt;
&lt;DIV&gt;
&lt;DIV id="Toggle_Conclusion"&gt;
&lt;P&gt;Coruna and DarkSword demonstrate that advanced iOS exploitation is no longer limited to elite threat actors. Patching alone is insufficient; organizations must implement Mobile Threat Defense (MTD) controls such as Check Point Mobile Security, to gain CVE-based risk visibility, web threat protection, and enforce conditional access before attacks impact the enterprise.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;cp&amp;lt;r&amp;gt; reference for more details:&amp;nbsp;&lt;A href="https://research.checkpoint.com/2026/9th-march-threat-intelligence-report/" target="_blank"&gt;https://research.checkpoint.com/2026/9th-march-threat-intelligence-report/&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Wed, 20 May 2026 04:54:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Mobile/Coruna-and-DarkSword-iOS-Exploits-How-Check-Point-Mobile/m-p/277166#M1330</guid>
      <dc:creator>michell</dc:creator>
      <dc:date>2026-05-20T04:54:40Z</dc:date>
    </item>
  </channel>
</rss>

