In context: More 180 journalists around the world have been targeted past various operators of the Pegasus spyware tool developed by Israeli house NSO Grouping. New inquiry reveals that despite the mutual perception that Apple devices are more secure, in that location are enough of vulnerabilities that tin can be exploited through Pegasus fifty-fifty when running the latest software revision for your device.

Last yr, it emerged that Facebook wanted to buy the infamous Pegasus spyware tool in 2022 with the explicit purpose to monitor iPhone and iPad users. Pegasus developer NSO Grouping refused to sell it for that purpose, as the house is known for its strict policy of only licensing its tools to governments and authorities agencies for legitimate use cases pertaining to national security and law enforcement.

Fast forward to today, and a new report from Citizen Lab highlights simply how effective Pegasus is even on devices running iOS 14. Security researchers found the tool facilitated a cipher-click attack on the iPhones of nine Bahraini activists between June 2022 and February 2022.

The set on relied on two zero-click iMessage exploits -- meaning no interaction from the user is necessary for the exploits to succeed. One of the exploit chains is called KISMET and was discovered in 2022, while the other is a completely new ane that is able to bypass Apple's Blastdoor protections, which is why Denizen Labs called it FORCEDENTRY.

Researchers establish the attack was successful confronting iPhones running an up-to-date version of iOS, and that versions 14.four and 14.6 are confirmed to be vulnerable to information technology. What isn't articulate at this bespeak is whether the security update in iOS 14.7.1 is meant to offering a fix for this detail exploit. Apple tree is aware of the issue, however, and the company will introduce more security protections in the upcoming iOS fifteen release.

Citizen Lab notes with a "loftier degree of confidence" that four of the nine activists that were hacked have been targeted by the government of Bahrain, which is said to have been using Pegasus since 2022. One of the activists had previously been hacked with the same tool in 2022.