Mickey Jin

301 posts

Mickey Jin banner
Mickey Jin

Mickey Jin

@patch1t

Exploring the world with my sword of debugger : )

Katılım Ağustos 2013
261 Takip Edilen5.3K Takipçiler
Sabitlenmiş Tweet
Mickey Jin
Mickey Jin@patch1t·
Love the gifts from @Apple Product Security! ❤️❤️❤️
Mickey Jin tweet mediaMickey Jin tweet mediaMickey Jin tweet media
English
18
23
1.2K
67.7K
Mickey Jin
Mickey Jin@patch1t·
@mysk_co The CVE-2026-28910 requires the access to a protected plist file first, this shouldn’t be considered as a real vulnerability, in my humble opinion.
English
1
0
1
81
Mickey Jin
Mickey Jin@patch1t·
@mysk_co This one is similar to my CVE-2026-20633, patched in macOS 26.4 too. However, my bug doesn’t require any user interaction. I can’t disclose the details right now because I have already submitted a bypass report 🫣
English
1
0
0
99
Mysk 🇨🇦🇩🇪
📝🚨 New blog post: How a bug in Archive Utility allowed access to protected app data (including iMessage and WhatsApp chats, and Safari cookies) without any permissions. The bug could also be exploited to hijack installed apps such as Signal and 1Password to perform phishing attacks. Apple fixed the issue in macOS 26.4 as CVE-2026-28910, five months after we reported it. mysk.blog/2026/05/19/cve…
English
5
10
66
43.1K
Speedyfriend67
Speedyfriend67@speedyfriend433·
Received my first Apple Bounty in my life! Couldn’t check the status in real time, but now I can 🙂
Speedyfriend67 tweet media
English
20
1
172
9.4K
Mickey Jin retweetledi
codecolorist@infosec.exchange
[email protected]@CodeColorist·
codecolor.ist/grapefruit/ Friday night product launch is not a good idea, but here is v1.0.0 release npm i -g igf Prebuilt single execuatbles are also available on GitHub release page. Please give a 🌟 if you like this tool, maybe I can beg for some free coding tokens with it
codecolorist@infosec.exchange tweet media
English
2
26
96
10.7K
Kevin
Kevin@gefrorenerapfel·
@patch1t @Apple That would be a dream 😍 Are you directly at apple or are you a partnered security researcher?
English
1
0
1
1.4K
Mickey Jin
Mickey Jin@patch1t·
Love the gifts from @Apple Product Security! ❤️❤️❤️
Mickey Jin tweet mediaMickey Jin tweet mediaMickey Jin tweet media
English
18
23
1.2K
67.7K
Mickey Jin retweetledi
Natalie Silvanovich
Natalie Silvanovich@natashenka·
Today, Project Zero released a 0-click exploit chain for the Pixel 9. While it targets the Pixel, the 0-click bug and exploit techniques we used apply to most other Android devices. projectzero.google/2026/01/pixel-…
English
7
237
1K
116.6K
Watch This Space
Watch This Space@wtsdev·
@patch1t For clarification, none of this was a collaboration. It's just the result of both of our independently (and almost coincidentally) researching the same targets.
English
1
0
1
419
Mickey Jin retweetledi
Watch This Space
Watch This Space@wtsdev·
Introducing DirtyDict. A series of vulnerabilities found by me and @patch1t. Most of this is my perspective, but Mickey did give me permission to share some details about one of his bugs. Enjoy! wts.dev/posts/dirtydic…
English
3
15
63
8.3K
Mickey Jin retweetledi
Csaba Fitzl
Csaba Fitzl@theevilbit·
🎉 My new blog post is about a PackageKit vulnerability I learned from @p1tsist1p 's blog posts. 🍎🐛macOS LPE via the .localized directory I tried convincing Apple to universally fix it with no luck. Go hunt for vulnerable pkg installers! There is a ton :-( Happy Friday! theevilbit.github.io/posts/localize…
English
3
31
129
12.8K
Mickey Jin retweetledi
Ferdous Saljooki
Ferdous Saljooki@malwarezoo·
Excited to share our research on ChillyHell, a modular macOS backdoor targeting officials in Ukraine. Check out our write-up for more details. jamf.com/blog/chillyhel…
English
2
10
32
4.9K
Mickey Jin
Mickey Jin@patch1t·
@logiruse The vulnerable API implementation also affects iOS, but it is more difficult to exploit because the mount trick doesn’t work on iOS.
English
0
0
2
118
logiruse
logiruse@logiruse·
@patch1t How does this risk affect apps on iOS?
English
1
0
0
123