News

Threat actor exploits Fastlane plugin trust to redirect Telegram traffic via C2 server after Vietnam’s ban, targeting mobile ...
Two malicious RubyGems packages posing as popular Fastlane CI/CD plugins redirect Telegram API requests to ...
to differentiate what is a normal user using an API and what is a C2 communication,” Netskope said in the article. Besides Telegram, threat actors often use OneDrive, GitHub, Dropbox ...
A Telegram for Android zero-day vulnerability dubbed 'EvilVideo' allowed attackers to send malicious Android APK payloads disguised as video files. A threat ... the Telegram API to ...
Threat actors are using Telegram as command and control (C2 ... it is difficult for defenders to differentiate C2 communications and a legitimate user using an API in cloud apps. The researchers said ...
Hackers have been found deploying an unfinished Russian malware, written in Golang, that leverages Telegram as its command-and-control (C2) channel. Netskope Threat Labs, the research wing of the ...
Cybersecurity researchers at ESET have uncovered a significant security ... versions of Telegram, specifically those before version 10.14.5. The hackers exploited the Telegram API, a tool for ...
During a meeting on Thursday, the Security Service of Ukraine and the General Staff of the Armed Forces of Ukraine said Telegram is actively used by Russia for cyberattacks, phishing, spreading ...
Among other topics, he also said that the Telegram messenger poses a threat to national security. Kyrylo Budanov believes that Telegram should be strictly regulated in Ukraine because of the threat to ...