- Apple and Google have rolled out a beta for end-to-end encrypted (E2EE) Rich Communication Services (RCS) messaging.
- The feature is enabled by default for conversations across iOS and Android platforms with supported carriers.
- The update addresses over 50 security vulnerabilities across Apple’s operating systems.
In a significant cross-platform security upgrade, Apple officially released iOS 26.5 with beta support for end-to-end encrypted RCS messaging on May 12, 2026, marking a collaborative industry push to replace less secure SMS. Consequently, this feature, which shows a lock icon in chats, is now available for iPhone users with supported carriers and Android users on the latest Google Messages.
The RCS protocol, built on an industry specification called the RCS Universal Profile, offers modern messaging features like high-resolution media sharing and read receipts. Meanwhile, Google confirmed its Messages app will display a padlock icon to signify encrypted cross-platform conversations.
This development stems from a “cross-industry effort” coordinated by the GSMA RCS Working Group. Alex Sinclair, chief technology officer at GSMA, stated the progress resulted from “close, cross‑industry collaboration between the GSMA RCS Working Group, including Apple, Google, and the wider mobile ecosystem.” However, the update also includes critical security patches for over 50 vulnerabilities in components like AppleJPEG and WebKit.
✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.
Previous Articles:
- Bitcoin Back at $82K, But 3 Upcoming Events Risk Turmoil
- Bitcoin Hits $82K Amid Trader Caution, ETF Flows Key for Rally
- OpenAI launches ‘Daybreak’ AI cybersecurity initiative
- Solana ETFs See Record Inflows, Futures Interest as SOL Targets $120
- <p><strong>Mr_Rot13 Hacker Group Targets cPanel Flaws for Backdoor Attacks</strong> </p> <p>A threat actor known as Mr_Rot13 has been exploiting a recently disclosed critical cPanel flaw to deploy a backdoor called <strong>Filemanager</strong> on compromised systems. The vulnerability (CVE-2024-41940) affects cPanel’s WebHost Manager, allowing authentication bypass and remote takeover. </p> <p>According to XLab researchers, the flaw has been abused by multiple threat actors shortly after its public disclosure last month, leading to cryptocurrency mining, ransomware, botnet spread, and backdoor implants. Monitoring shows over 2,000 attacker IPs worldwide are involved in automated attacks. </p> <p>The exploitation uses a shell script to download a Go-based infector from a remote server, which then implants an SSH key for persistent access and drops a PHP web shell. That web shell injects JavaScript to steal login credentials and sends them to an attacker-controlled system. </p> <p>The backdoor supports file management, remote command execution, and shell access. It also collects host data like bash history, SSH details, database passwords. </p> <p>Evidence suggests Mr_Rot13 has operated silently for years, with infrastructure linked to samples dating back to 2020.</p>
