's Avatar

@swaroopsy.bsky.social

13 Followers  |  12 Following  |  205 Posts  |  Joined: 14.02.2025  |  1.8267

Latest posts by swaroopsy.bsky.social on Bluesky

4/4 This is where virtualized platforms like @corellium.bsky.social solve the problem. Jailbroken environments for iOS 18-26. Full system access without waiting for exploits that'll never show up.
2026 is forcing everyone to choose. There's gotta be a better way. #Corellium

12.12.2025 04:58 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

3/4 Physical jailbreaks aren't coming back. Exploits sell for millions now. Nobody's releasing free public tools anymore. That era is done.
Your only options: test on old iOS versions you can jailbreak, or ship on new iOS you can't verify. Both suck. #PenTesting #iOSSecurity

12.12.2025 04:58 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

2/4 So now we're stuck:
Production apps run on iOS 18+

Security teams test on iOS 16 (last jailbreakable version)
The gap keeps growing. Banking apps requiring iOS 18. Healthcare dropping iOS 17 support. Security teams still can't test properly. #MobileSecurity

12.12.2025 04:58 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Post image

1/4 iOS SECURITY TESTING IN 2026: WE HAVE A PROBLEM
Companies are pushing apps requiring iOS 18 minimum. Sounds good for security, right?
Except there's no public jailbreak for iOS 18. Without it, you can't do real security testing. No root access. No runtime checks. #AppSec

12.12.2025 04:58 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Preview
GitHub - sensepost/objection: πŸ“± objection - runtime mobile exploration πŸ“± objection - runtime mobile exploration. Contribute to sensepost/objection development by creating an account on GitHub.

5/5
Link to Objection: github.com/sensepost/ob...
#iOS #iOSSecurity #Objection #Frida #Corellium #MobileSecurity #AppSec #Pentesting

05.12.2025 03:46 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

4/5
Saved me a bunch of setup time. If you're into iOS security testing, this setup is pretty solid. The new Frida 17.x support in this release makes everything way more stable too.

05.12.2025 03:46 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Post image

3/5
The nice part? I didn't need to mess around with physical devices. Just spun up a virtual iOS environment on @corellium.bsky.social and got straight to testing.

05.12.2025 03:46 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

2/5
For anyone not familiar, Objection basically lets you:
Bypass SSL pinning
Dump keychains
Handle memory dumps and patches
Play around with heap objects

05.12.2025 03:46 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

1/5
Quick update - Objection just dropped version 1.12.2 with Frida 17.x support, so I had to test it out right away!
Got it running with iOS 26.x on my Corellium device and everything's working smooth.

05.12.2025 03:46 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

8/8
2026 will separate the teams who adapted from those who didn't.
The gap between attackers and defenders is growing. Fast.
#mobilesecurity #fraud #deepfake #appsec #fintech #cybersecurity #AI #corellium

28.11.2025 04:22 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

7/8
Virtualized testing environments like @corellium.bsky.social let teams catch up:
Test liveness detection against deepfakes. Validate SDK behavior at runtime. Inspect actual iOS versions before attackers do.
Real devices. Real exploits. Real validation.

28.11.2025 04:22 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

6/8
Most security teams are still testing on iOS 16 or relying on static analysis alone.
That's not a strategy. That's a countdown.

28.11.2025 04:22 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

5/8
The real problem:
Three years without jailbreak-based testing means teams can't verify their defenses work on iOS 17, 18, or 26.
Attackers need to find one vulnerability. Defenders can't prove they've closed any.

28.11.2025 04:22 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

4/8
What's coming in 2026:
AI-powered mobile malware using LLMs to find zero-days faster than security teams can patch them.
Supply chain attacks through third-party SDKs up 40% in 2025 and accelerating.
API abuse with mobile apps as the entry point to cloud infrastructure.

28.11.2025 04:22 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

3/8
More from Hong Kong: Forged IDs plus AI-generated selfies opened real bank accounts for money laundering operations.
This wasn't theoretical research. These were live attacks on production systems.
And they worked.

28.11.2025 04:22 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

2/8
What happened in 2025:
Indonesia: 1,000+ fraudulent loan apps using AI-generated faces and deepfake videos bypassed mobile KYC systems.
Hong Kong: Criminal syndicates used face-swap deepfakes to pass video KYC on finance platforms. Loans approved before anyone noticed.

28.11.2025 04:22 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

1/8
2025 showed us what AI-powered mobile fraud looks like.2026 will show us what happens when defenders can't keep up. Here's what's coming 🧡

28.11.2025 04:22 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Post image

5/5
With @corellium.bsky.social's virtualized mobile environments, security teams can test liveness detection against synthetic inputs, simulate camera manipulation attacks, and run automated fraud scenarios at scale before attackers exploit them.
#corellium

21.11.2025 05:37 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

4/5
How do you test if your app can distinguish between real faces and AI-generated ones? You need runtime access to test device sensors, manipulate camera inputs, and simulate these attack scenarios before fraudsters do.

21.11.2025 05:37 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

3/5
This wasn't state-sponsored. This was loan fraud at scale using readily available AI tools. If microloan apps are getting hit with deepfakes, every mobile app with identity verification is vulnerable.
#appsec #cybersecurity

21.11.2025 05:37 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

2/5
A mobile loan app faced a wave of attacks using deepfake videos to bypass their selfie verification. Attackers exploited weak liveness detection and basic face matching. Many fraudulent applications got through before the pattern was detected.
#KYC #fintech

21.11.2025 05:37 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

1/5
Deepfake attacks just bypassed mobile KYC in Indonesia. Over 1,000 fraudulent loan applications using AI-generated faces and synthetic videos. The mobile apps couldn't tell the difference.
#mobilesecurity #fraud #deepfake

21.11.2025 05:37 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
LinkedIn This link will take you to a page that’s not on LinkedIn

6/6
Register here: www.corellium.com/mobile-secur...
This webinar is part of Corellium's Change What's Possible series.
#appsec #corellium #mobilesecurity #CyberSecurity

07.11.2025 04:52 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

5/6
Join me November 12th at 5pm ET for a webinar on what this means for your mobile security program in 2026. We'll cover the iOS visibility blackout, compliance challenges, and what's next for mobile AppSec.

07.11.2025 04:52 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

4/6
Without visibility into runtime behavior and exploit paths, how do you validate your app's security posture? Traditional mobile security testing methods are becoming obsolete.

07.11.2025 04:52 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

3/6
The FORCEDENTRY exploit allowed remote compromise of fully patched iPhones through malicious PDFs. These attacks succeeded because defenders couldn't see what was happening at runtime

07.11.2025 04:52 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

2/6
This isn't theoretical. Real incidents prove the cost.
Operation Triangulation in 2023 used a chain of iOS zero-days to install malware via iMessage. It went undetected for years.

07.11.2025 04:52 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

1/6
iOS security testing just hit a wall. For the first time, there are no public jailbreaks for current iOS versions. Security teams that relied on them for runtime analysis are now operating blind.

07.11.2025 04:52 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

7/7
Knowing 40,000 vulnerabilities exist isn't useful.
Knowing which 5 actually threaten your app? That's everything.
The signal matters more than the noise.

#appsec #corellium #mobilesecurity #PenTesting

31.10.2025 06:20 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

6/7
@corellium.bsky.social research demonstrates virtualized testing as the path forward:
Spin up iOS devices with full system access. Reproduce the actual exploit. See if it works in YOUR app.
Test before shipping, not after the breach.

31.10.2025 06:20 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

@swaroopsy is following 12 prominent accounts