patrickwardle Profile Banner
Patrick Wardle Profile
Patrick Wardle

@patrickwardle

Followers
40K
Following
16K
Media
878
Statuses
10K

🛠 🍎 👾 Objective-See'ing & DoubleYou'ing

Maui, HI
Joined October 2013
Don't wanna be here? Send us removal request.
@patrickwardle
Patrick Wardle
1 year
Stoked for the next (ad)venture: "DoubleYou" Cofounded w/ long-time friend @hexlogic, we're empowering those building security tools for Apple devices 🍎🛡️. And by bootstrapping this venture, our core value of democratizing security remains our focus!.
Tweet card summary image
techcrunch.com
Patrick Wardle and Mikhail Sosonkin want to sell specific tools to cybersecurity companies focused on protecting Apple devices.
17
31
168
@patrickwardle
Patrick Wardle
1 hour
RT @moonlock_lab: @9to5mac 2/7: While digging, our engine flagged a new JSCoreRunner sample with 0 detections on VirusTotal (as of 2025-09-….
0
2
0
@patrickwardle
Patrick Wardle
5 hours
RT @moonlock_lab: 1/7: Huge kudos to Mosyle for the original catch and to @9to5mac for spreading the word (. Our La….
0
7
0
@patrickwardle
Patrick Wardle
5 hours
RT @quarkslab: The two bytes that make size matter:.Reverse engineering Apple's iOS 0-click CVE-2025-43300 improved bounds checking fix, by….
0
34
0
@patrickwardle
Patrick Wardle
5 hours
RT @osint_barbie: Last week brought a wave of articles on mentalpositive and his #macos #stealer . Seems like it’s a prime time to meet the….
0
5
0
@patrickwardle
Patrick Wardle
2 days
Was stoked to talk nerdy w/ @KandjiOfficial on their "Patch Me If You Can" podcast! Have a listen 🎙️🎶.
@KandjiOfficial
Kandji
2 days
@patrickwardle shares why he thinks Apple is becoming "more friendly" with the external security research community. What's your perspective? Feel free to drop your perspective in the comments. P.S. Watch Patrick's full Patch Me If You Can™ episode here:
1
4
20
@patrickwardle
Patrick Wardle
6 days
Maybe we should all be taking closer looks at our iOS/macOS WhatsApp crash reports!? 😬 (TBD if related to CVE-2025-55117)
Tweet media one
@billmarczak
Bill Marczak
6 days
WhatsApp just patched a very fun zero-click bug (CVE-2025-55177)! WhatsApp assesses that it was used partially in conjunction with the iOS RawCamera DNG vulnerability (CVE-2025-43300)
Tweet media one
0
12
90
@patrickwardle
Patrick Wardle
6 days
RT @billmarczak: WhatsApp just patched a very fun zero-click bug (CVE-2025-55177)! WhatsApp assesses that it was used partially in conjunc….
0
30
0
@patrickwardle
Patrick Wardle
8 days
RT @OliviaGalluccii: I'm thrilled to share my latest blog post on Mach-Os, its role on macOS, and how it works with Apple's Code Signing an….
0
22
0
@patrickwardle
Patrick Wardle
9 days
RT @g0njxa: In the past days I've been observing a malware campaign using X verified accounts affiliated to account @KindleBookVerse (I see….
0
28
0
@patrickwardle
Patrick Wardle
9 days
RT @osint_barbie: 3/ VT intel: first seen July 18. Still just 2 detections (Ikarus + Google). Earlier only Ikarus flagged it. https://t.co/….
0
2
0
@patrickwardle
Patrick Wardle
9 days
RT @osint_barbie: 2/ Key URL in strings: https://progressdev[.]xyz/salon. Hitting the URL returns an AppleScript starting with: osascript -….
0
2
0
@patrickwardle
Patrick Wardle
9 days
RT @iblametom: 🚨NEW 🚨Russia is mandating a new VK messaging app called Max. We had some researchers take a look and it's tracking basicall….
Tweet card summary image
forbes.com
Security researchers found that Max, which Russia will require to be pre-installed on all phones, is designed to track users, confirming fears the app will be used for surveillance.
0
11
0
@patrickwardle
Patrick Wardle
9 days
Remember when the UAE pushed ToTok (not TikTok!), a spying app disguised as a video/chat app? 🫣. Now Russia is rolling out its own: 'Max':. No E2E encryption + background location tracking = perfect mass ('max'? 😂) surveillance tool? 📡🕵🏻‍♀️
Tweet media one
1
10
51
@patrickwardle
Patrick Wardle
9 days
RT @objective_see: Who's excited for the #OBTS v8 🍏-themed CTF?. Bring your hacking skills, solve some (Apple) juicy challenges, and win pr….
0
8
0
@patrickwardle
Patrick Wardle
9 days
RT @osint_barbie: 1/ Nice catch by @g0njxa: ads drop #macOS #stealer as well. First stage: signed DMG "Alli-Ai.dmg". Inside: Mach-O file na….
0
31
0
@patrickwardle
Patrick Wardle
11 days
RT @msuiche: 🚨 New blog post: ELEGANTBOUNCER - Catch iOS 0-click exploits without having the samples. Features iOS backup forensics & messa….
0
63
0
@patrickwardle
Patrick Wardle
11 days
RT @theevilbit: We will give a walkthrough of this at @objective_see #OBTS with @gergely_kalman.
0
4
0
@patrickwardle
Patrick Wardle
14 days
RT @objective_see: We've just added this sample, "RustyPages" to our public macOS malware collection!. (pw: infect3….
Tweet card summary image
github.com
macOS Malware Collection. Contribute to objective-see/Malware development by creating an account on GitHub.
0
7
0
@patrickwardle
Patrick Wardle
14 days
Tweet media one
@L0Psec
L0Psec
16 days
New RE Blog Post: RustyPages-Pt1. We RE a Rust dropper, that sets persistence and runs the downloaded next stage, queries @patrickwardle's tools, and quiets notifications. We included relevant IOCs as we continue our analysis of the loader for Part 2. :).
1
6
35