{"id":53529,"date":"2023-09-04T05:29:36","date_gmt":"2023-09-04T05:29:36","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/apple-opens-annual-applications-for-free-hackable-iphones\/"},"modified":"2023-09-04T05:29:36","modified_gmt":"2023-09-04T05:29:36","slug":"apple-opens-annual-applications-for-free-hackable-iphones","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/apple-opens-annual-applications-for-free-hackable-iphones\/","title":{"rendered":"Apple opens annual applications for free hackable iPhones"},"content":{"rendered":"<p><span class=\"label\">Infosec in brief<\/span> The latest round of Apple&#8217;s Security Research Device (SRD) program is open, giving security researchers a chance to get their hands on an unlocked device \u2013 and Apple&#8217;s blessing to attack it and test its security capabilities.<\/p>\n<p>&#8220;iPhone is the world&#8217;s most secure consumer mobile device, which can make it challenging for even skilled security researchers to get started,&#8221; Apple oh-so-humbly states in its description of the program on the application <a href=\"https:\/\/security.apple.com\/research-device\/\" rel=\"nofollow\">page<\/a>.<\/p>\n<p>To make it easier for researchers to stress test Apple&#8217;s iOS security features, chosen applicants will be handed &#8220;a specially-built hardware variant of iPhone 14 Pro that&#8217;s designed exclusively for security research,&#8221; Apple explained in a <a href=\"https:\/\/security.apple.com\/blog\/security-research-device-program-2024\/\" rel=\"nofollow\">blog post<\/a>.<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"condor\" data-xsm=\",fluid,mpu,\" data-sm=\",fluid,mpu,\" data-md=\",fluid,mpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZPWM2OE3uZ@KPBfeh6SE9QAAAQo&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZPWM2OE3uZ@KPBfeh6SE9QAAAQo&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<p>Thse SRD devices, Apple said, include options to configure or disable iOS security settings that can&#8217;t be changed on retail devices. In addition, researchers can install and boot custom kernel caches, run arbitrary code with any level of entitlement they want, set NVRAM variables and even install and boot custom firmware for new iOS 17 security features.&nbsp;<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"falcon\" data-xmd=\",fluid,mpu,leaderboard,\" data-lg=\",fluid,mpu,leaderboard,\" data-xlg=\",fluid,billboard,superleaderboard,mpu,leaderboard,\" data-xxlg=\",fluid,billboard,superleaderboard,brandwidth,brandimpact,leaderboard,mpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44ZPWM2OE3uZ@KPBfeh6SE9QAAAQo&amp;t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44ZPWM2OE3uZ@KPBfeh6SE9QAAAQo&amp;t=ct%3Dns%26unitnum%3D426raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<div class=\"adun_eagle_desktop_story_wrapper\">\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"mid\" data-raptor=\"eagle\" data-xxlg=\",mpu,dmpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33ZPWM2OE3uZ@KPBfeh6SE9QAAAQo&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33ZPWM2OE3uZ@KPBfeh6SE9QAAAQo&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<\/p><\/div>\n<p>That said, Apple doesn&#8217;t want researchers toting the vulnerable-by-design devices around with them, and states on the application page that the device &#8220;must remain on the premises of program participants at all times.&#8221; Access to the device must be restricted to approved participants as well \u2013 so no showing it off.&nbsp;<\/p>\n<p>Apple said it approves applicants &#8220;based on a track record in security research, including on platforms other than iPhone,&#8221; and it&#8217;ll accept applications from institutions too.&nbsp;<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"falcon\" data-xsm=\",fluid,mpu,\" data-sm=\",fluid,mpu,\" data-md=\",fluid,mpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44ZPWM2OE3uZ@KPBfeh6SE9QAAAQo&amp;t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44ZPWM2OE3uZ@KPBfeh6SE9QAAAQo&amp;t=ct%3Dns%26unitnum%3D426raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<p>Any flaws found in iOS security software as part of the SRD program must be reported to Apple and are eligible for a bug bounty; Apple <a href=\"https:\/\/www.theregister.com\/2022\/10\/28\/apple_boosts_bug_bounties_blogs\/\">upped<\/a> its max bounty to $500,000 last year, with bonuses available depending on the severity of the issue.&nbsp;<\/p>\n<p>&#8220;Since we launched the program in 2019, SRD program researchers have discovered 130 high impact, security-critical vulnerabilities,&#8221; Apple said, which have resulted in &#8220;over 100 reports from our SRDP researchers, with multiple awards reaching $500,000 and a median award of nearly $18,000.&#8221;&nbsp;<\/p>\n<p>Applications for the SRD program are due by October 31. Chosen participants will be notified in early 2024.<\/p>\n<div class=\"boxout\" readability=\"29.344051446945\">\n<h3 class=\"crosshead\">Critical vulnerabilities: VMware&#8217;s bad week<\/h3>\n<p>We kick off this week&#8217;s list of critical vulnerabilities with some serious (CVSS 9.8) issues discovered in VMware&#8217;s Aria network monitoring tool. If exploited, they can give an attacker access to Aria Operations for Networks&#8217; command line interface. The root cause is an authentication bypass vulnerability &#8220;due to a lack of unique cryptographic key generation,&#8221; VMware <a href=\"https:\/\/www.vmware.com\/security\/advisories\/VMSA-2023-0018.html\" rel=\"nofollow\">said<\/a>.<\/p>\n<p>VMware released a <a href=\"https:\/\/www.vmware.com\/security\/advisories\/VMSA-2023-0019.html\" rel=\"nofollow\">second<\/a> security update this week. While not as serious \u2013 rating just a 7.5 on the 10-point CVSS scale \u2013 it&#8217;s still an issue for those using VMware Tools, which contain an SAML token signature bypass vulnerability.<\/p>\n<p>Juniper also merits a special mention this week, as a series of vulnerabilities affecting &#8220;all versions of Junos OS on SRX and EX series&#8221; firewalls and switches was reported that collectively earn a CVSS score of 9.8. By chaining the vulnerabilities together, an unauthenticated attacker &#8220;may be able to remotely execute code on the devices,&#8221; Juniper <a href=\"https:\/\/supportportal.juniper.net\/s\/article\/2023-08-Out-of-Cycle-Security-Bulletin-Junos-OS-SRX-Series-and-EX-Series-Multiple-vulnerabilities-in-J-Web-can-be-combined-to-allow-a-preAuth-Remote-Code-Execution?language=en_US\" rel=\"nofollow\">said<\/a>.&nbsp;&nbsp;<\/p>\n<p>Elsewhere:<\/p>\n<ul>\n<li>Mozilla released security <a href=\"https:\/\/www.cisa.gov\/news-events\/alerts\/2023\/08\/30\/mozilla-releases-security-updates-multiple-products\" rel=\"nofollow\">updates<\/a> for several products to address vulnerabilities that would allow an attacker &#8220;to take control of an affected system.&#8221;&nbsp;<\/li>\n<li>CVSS 8.8 \u2013 <a href=\"https:\/\/www.cisa.gov\/news-events\/ics-advisories\/icsa-23-241-01\" rel=\"nofollow\">CVE-2023-4296<\/a>: PTC&#8217;s Codebeamer application lifecycle management platform is vulnerable to cross-site scripting attacks if users click on malicious links, allowing attackers to inject arbitrary code into web browsers on target devices.<\/li>\n<\/ul>\n<p>As always, get patching, and thank your stars that it appears to be quiet going into a long weekend for US IT professionals.<\/p>\n<\/div>\n<h3 class=\"crosshead\">Hackers purge Brazilian spyware firm&#8217;s device database<\/h3>\n<p>No one likes &#8220;legitimate&#8221; spyware \u2013 a.k.a., <a href=\"https:\/\/www.theregister.com\/2019\/11\/20\/stalkerware_coalition_kicks_off\/\">stalkerware<\/a> \u2013 including a group of hackers who reported this week that they&#8217;d broken into systems owned by stalkerware firm <a target=\"_blank\" href=\"https:\/\/www.webdetetive.com.br\/\" rel=\"noopener\">WebDetetive<\/a> and wiped its system of victim devices.&nbsp;<\/p>\n<p>The unknown cyber vigilantes <a href=\"https:\/\/techcrunch.com\/2023\/08\/26\/brazil-webdetetive-spyware-deleted\/?&amp;web_view=true\" rel=\"nofollow\">explained<\/a> they exploited vulnerabilities in WebDetetive&#8217;s systems to siphon nearly 77,000 device records from its databases, though they allege they didn&#8217;t steal the contents of victim devices.&nbsp;<\/p>\n<div aria-hidden=\"true\" class=\"adun\" id=\"story_eagle_xsm_sm_md_xmd_lg_xlg\" data-pos=\"mid\" data-raptor=\"eagle\" data-xsm=\",mpu,dmpu,\" data-sm=\",mpu,dmpu,\" data-md=\",mpu,dmpu,\" data-xmd=\",mpu,dmpu,\" data-lg=\",mpu,dmpu,\" data-xlg=\",mpu,dmpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33ZPWM2OE3uZ@KPBfeh6SE9QAAAQo&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33ZPWM2OE3uZ@KPBfeh6SE9QAAAQo&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<p>WebDetetive bills itself as &#8220;the #1 Spy App in Brazil,&#8221; and describes its software as a way to &#8220;see the truth&#8221; and &#8220;find out what the person is doing on their phone and they won&#8217;t even know they are being monitored.&#8221;&nbsp;<\/p>\n<p>Unfortunately, it doesn&#8217;t appear WebDetetive put the same thought into protecting its own systems. The hackers claim they severed connections between devices on the network at the server level \u2013 effectively killing the platform&#8217;s functionality and preventing any additional data from being uploaded from victim devices.&nbsp;<\/p>\n<p>Why did the unidentified hackers do it? &#8220;Because we could. Because #fuckstalkerware,&#8221; they said in a note included with a 1.5GB data dump from the platform.&nbsp;<\/p>\n<h3 class=\"crosshead\">Fast fashion pwn: Forever 21 employee data stolen in breach<\/h3>\n<p>Despite learning of a security breach that compromised personal identifiable information on more than half a million employees in March, fast fashion chain Forever 21 is only just now <a href=\"https:\/\/apps.web.maine.gov\/online\/aeviewer\/ME\/40\/dfe496ce-bd38-477c-912a-26bd54798369.shtml\" rel=\"nofollow\">notifying<\/a> them about it.&nbsp;<\/p>\n<p>According to a breach notification <a href=\"https:\/\/apps.web.maine.gov\/online\/aeviewer\/ME\/40\/dfe496ce-bd38-477c-912a-26bd54798369\/7b58242e-7429-4aea-bc05-b365e9e0d461\/document.html\" rel=\"nofollow\">letter<\/a> [PDF] set to go out to 539,207 employees, some juicy details were exposed: names, social security numbers, birthdates, bank account numbers, and health plan data were all stolen.&nbsp;<\/p>\n<p>Forever 21 stated that the breach began in January, and that attackers accessed its systems &#8220;at various times&#8221; between then and March 21, when the retailer identified the incident and presumably plugged the leak.<\/p>\n<p>It&#8217;s not clear from the breach notification letter what happened, but we can speculate.&nbsp;<\/p>\n<p>&#8220;We have no evidence to suggest your information has been misused for purposes of fraud or identity theft as a result of this incident \u2013 and no reason to believe that it will be,&#8221; the fashion flogger said.&nbsp;<\/p>\n<p>That sounds suspiciously like the sort of response one would expect when a ransom was paid, which Forever 21 hasn&#8217;t admitted was the case.&nbsp;\u00ae<\/p>\n<p> READ MORE <a href=\"https:\/\/go.theregister.com\/feed\/www.theregister.com\/2023\/09\/04\/infosec_in_brief\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>ALSO: Brazilian stalkerware database ripped by the short hairs, a fast fashion breach, and this week&#8217;s critical vulns Infosec in brief\u00a0 The latest round of Apple&#8217;s Security Research Device (SRD) program is open, giving security researchers a chance to get their hands on an unlocked device \u2013 and Apple&#8217;s blessing to attack it and test its security capabilities.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-53529","post","type-post","status-publish","format-standard","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Apple opens annual applications for free hackable iPhones 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/apple-opens-annual-applications-for-free-hackable-iphones\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Apple opens annual applications for free hackable iPhones 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/apple-opens-annual-applications-for-free-hackable-iphones\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-09-04T05:29:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZPWM2OE3uZ@KPBfeh6SE9QAAAQo&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-opens-annual-applications-for-free-hackable-iphones\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-opens-annual-applications-for-free-hackable-iphones\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Apple opens annual applications for free hackable iPhones\",\"datePublished\":\"2023-09-04T05:29:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-opens-annual-applications-for-free-hackable-iphones\\\/\"},\"wordCount\":986,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-opens-annual-applications-for-free-hackable-iphones\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/pubads.g.doubleclick.net\\\/gampad\\\/ad?co=1&amp;iu=\\\/6978\\\/reg_security\\\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZPWM2OE3uZ@KPBfeh6SE9QAAAQo&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-opens-annual-applications-for-free-hackable-iphones\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-opens-annual-applications-for-free-hackable-iphones\\\/\",\"name\":\"Apple opens annual applications for free hackable iPhones 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-opens-annual-applications-for-free-hackable-iphones\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-opens-annual-applications-for-free-hackable-iphones\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/pubads.g.doubleclick.net\\\/gampad\\\/ad?co=1&amp;iu=\\\/6978\\\/reg_security\\\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZPWM2OE3uZ@KPBfeh6SE9QAAAQo&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\",\"datePublished\":\"2023-09-04T05:29:36+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-opens-annual-applications-for-free-hackable-iphones\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-opens-annual-applications-for-free-hackable-iphones\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-opens-annual-applications-for-free-hackable-iphones\\\/#primaryimage\",\"url\":\"https:\\\/\\\/pubads.g.doubleclick.net\\\/gampad\\\/ad?co=1&amp;iu=\\\/6978\\\/reg_security\\\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZPWM2OE3uZ@KPBfeh6SE9QAAAQo&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\",\"contentUrl\":\"https:\\\/\\\/pubads.g.doubleclick.net\\\/gampad\\\/ad?co=1&amp;iu=\\\/6978\\\/reg_security\\\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZPWM2OE3uZ@KPBfeh6SE9QAAAQo&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-opens-annual-applications-for-free-hackable-iphones\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Apple opens annual applications for free hackable iPhones\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Apple opens annual applications for free hackable iPhones 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/apple-opens-annual-applications-for-free-hackable-iphones\/","og_locale":"en_US","og_type":"article","og_title":"Apple opens annual applications for free hackable iPhones 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/apple-opens-annual-applications-for-free-hackable-iphones\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-09-04T05:29:36+00:00","og_image":[{"url":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZPWM2OE3uZ@KPBfeh6SE9QAAAQo&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/apple-opens-annual-applications-for-free-hackable-iphones\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/apple-opens-annual-applications-for-free-hackable-iphones\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Apple opens annual applications for free hackable iPhones","datePublished":"2023-09-04T05:29:36+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/apple-opens-annual-applications-for-free-hackable-iphones\/"},"wordCount":986,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/apple-opens-annual-applications-for-free-hackable-iphones\/#primaryimage"},"thumbnailUrl":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZPWM2OE3uZ@KPBfeh6SE9QAAAQo&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/apple-opens-annual-applications-for-free-hackable-iphones\/","url":"https:\/\/www.threatshub.org\/blog\/apple-opens-annual-applications-for-free-hackable-iphones\/","name":"Apple opens annual applications for free hackable iPhones 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/apple-opens-annual-applications-for-free-hackable-iphones\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/apple-opens-annual-applications-for-free-hackable-iphones\/#primaryimage"},"thumbnailUrl":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZPWM2OE3uZ@KPBfeh6SE9QAAAQo&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0","datePublished":"2023-09-04T05:29:36+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/apple-opens-annual-applications-for-free-hackable-iphones\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/apple-opens-annual-applications-for-free-hackable-iphones\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/apple-opens-annual-applications-for-free-hackable-iphones\/#primaryimage","url":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZPWM2OE3uZ@KPBfeh6SE9QAAAQo&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0","contentUrl":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZPWM2OE3uZ@KPBfeh6SE9QAAAQo&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/apple-opens-annual-applications-for-free-hackable-iphones\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Apple opens annual applications for free hackable iPhones"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/53529","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=53529"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/53529\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=53529"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=53529"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=53529"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}