i✌️erify
@IsMyPhoneHacked
Followers
1K
Following
145
Media
87
Statuses
354
Secure your phone with iVerify.
New York, NY
Joined June 2011
🚨 Democratizing Threat Hunting is Changing Mobile Security! 🚨 Today, we announced our latest investigation led to 18,000+ device scans, uncovering 11 new Pegasus spyware infections—many targeting business. 📱💼 Take control —scan your device today! 🔍 https://t.co/j9czmvoD6j
0
3
7
@OpenAI @addigy A big big mahalo to our "Friends of" who make this all possible! 😍 @KandjiOfficial, @fleetctl, @Jamf, @PaloAltoNtwks, @MacPaw/@moonlock_com, @Sophos, @HuntressLabs, @IsMyPhoneHacked, and others! Join us: https://t.co/e5H3RRQiPt
1
7
18
Matthais (@helthydriver)/iVerify(@IsMyPhoneHacked)/Dreams of ( https://t.co/DNDC5lP1xa) - spoke at #OBTS about Hunting iOS malware - flipping the script using Malware Simulation - building fake spyware to reveal real forensic clues! Also an interesting site https://t.co/cwIIMJKmD8
0
6
12
Sarah (@iamevltwin) from @IsMyPhoneHacked is a regular at #OBTS - as well as helping with the awesome #CTF this year she gave a super forensicator talk about the Golden Power of Apple’s Juicy Powerlogs - recommend watching!
0
7
32
BSidesNYC welcomes @IsMyPhoneHacked as a kilobit sponsor for our Oct 18, 2025, conference. https://t.co/sRG8TTJ3uC iVerify protects every phone in the workplace from the actual threats they face. https://t.co/20jAzO5p5w
0
1
1
Prep for @BSidesNYC 0x05 is in full swing. Many thanks to @CodeRedPartners, DataBee, @gecko_sec, @HeelerSecurity, @IsMyPhoneHacked, @JaneStreetGroup, @strongdm, and @tracebit_com for contributing swag.
1
3
9
Every conversation with iVerify co-founder Rocky Cole feels like a window into the not-too-distant future. One to watch. @ParameterVC x @IsMyPhoneHacked
0
2
2
Every journalist, and every employee of media companies, should have @IsMyPhoneHacked #iVerify installed on all mobile devices.
Cyberattacks target email accounts of senior journalists https://t.co/XiObFSrrtH
0
1
1
Smartphones are prime targets for exploitation, regardless of which encrypted app is installed or whether official business gets discussed, says @IsMyPhoneHacked's Rocky Cole in this commentary. #cybersecurity #infosec #ITsecurity
scworld.com
Why we have to pay more attention to mobile threats as commercial spyware on smartphones proliferates.
1
1
4
Smartphones are prime targets for exploitation, regardless of which encrypted app is installed or whether official business gets discussed, says @IsMyPhoneHacked's Rocky Cole in this commentary. #cybersecurity #infosec #ITsecurity
scworld.com
Why we have to pay more attention to mobile threats as commercial spyware on smartphones proliferates.
0
1
2
Smartphones are prime targets for exploitation, regardless of which encrypted app is installed or whether official business gets discussed, says @IsMyPhoneHacked's Rocky Cole in this commentary. #cybersecurity #infosec #ITsecurity
scworld.com
Why we have to pay more attention to mobile threats as commercial spyware on smartphones proliferates.
0
2
2
Every journalist should have @IsMyPhoneHacked #iVerify installed on all devices
Scoop: A cyberattack on the Washington Post compromised email accounts of several journalists and was potentially the work of a foreign government, company officials told some affected staffers in recent days. W/@dnvolz and @bobmcmillan
https://t.co/fxYV5GGOyE
1
2
3
@Apple has resolved an iMessage issue involving the Nickname Update feature that could have been exploited to trigger errors with no user interaction, according to @IsMyPhoneHacked. #cybersecurity #infosec #ITsecurity
scworld.com
The now-resolved issue was potentially used to target high-profile individuals, researchers say.
0
1
2
@Apple has resolved an iMessage issue involving the Nickname Update feature that could have been exploited to trigger errors with no user interaction, according to @IsMyPhoneHacked. #cybersecurity #infosec #ITsecurity
scworld.com
The now-resolved issue was potentially used to target high-profile individuals, researchers say.
0
1
0
@Apple has resolved an iMessage issue involving the Nickname Update feature that could have been exploited to trigger errors with no user interaction, according to @IsMyPhoneHacked. #cybersecurity #infosec #ITsecurity
scworld.com
The now-resolved issue was potentially used to target high-profile individuals, researchers say.
0
3
3
@Apple has resolved an iMessage issue involving the Nickname Update feature that could have been exploited to trigger errors with no user interaction, according to @IsMyPhoneHacked. #cybersecurity #infosec #ITsecurity
scworld.com
The now-resolved issue was potentially used to target high-profile individuals, researchers say.
0
1
1
NEW: The Harris-Walz campaign may have been the victim of an iPhone hacking campaign that targeted five high-profile Americans Cybersecurity company iVerify says evidence suggests a novel hack that targeted politicians, people in media, and AI. https://t.co/xgRiPURPIn
nbcnews.com
Apple strongly disagreed with the claim that a series of attacks targeted its users, saying the "report points to a conventional software bug that we identified and fixed in iOS 18.3."
7
17
20
Great work by the @IsMyPhoneHacked #IVerify team. Every news org and major company and institution should install their system across all devices immediately.
2
2
2
Pleased to see iVerify expand its team with the addition of Mike Rosen. He brings deep experience from leading the security incident response team at @Apple, co-authoring the data breach investigations report at @Verizon, and holding key roles at @nightdragon, @PwC, and
🎉We are delighted to announce the appointment of Mike Rosen, former Apple alum, as CISO at iVerify. Mike will lead security strategy, investigations, compliance initiatives, and customer risk management. Welcome aboard, Mike! https://t.co/cH76AeCdf4
#CISO #mobile #cybersecurity
1
1
3
The @IsMyPhoneHacked Sensitive Travel solution is enabled by a proprietary data set that maps the world’s malicious telecom infrastructure. #MobileSecurity #cybersecurity #telecom
https://t.co/fXrgcHuw33
0
1
1
📡 Sensitive phone data flows through China: The future of cybersecurity, the latest from @axios report https://t.co/PQb5yUxHgx report reveals 60+ mobile operators route sensitive data — location, texts, and browsing history, through China-based telecom networks. #MobileSecurity
0
0
1