IT threat evolution Q1 2024
SecureList
JUNE 3, 2024
The attackers were able to bypass this hardware-based security protection using another hardware feature of Apple-designed SoCs (System on a Chip): they did this by writing the data, destination address and data hash to unknown hardware registers of the chip that are not used by the firmware.
Let's personalize your content