News

Researchers at security vendor Checkmarx have uncovered an operation, apparently based in Iraq, that uses malware hosted on the Python repository PyPI to search for files on the victim's device and ...
Researchers at cloud forensics and incident response platform startup Cado Security Ltd. today announced details of a recently discovered Python-based credential harvester and hacking tool. Dubbed ...
Threat actor exploits Fastlane plugin trust to redirect Telegram traffic via C2 server after Vietnam’s ban, targeting mobile app CI/CD pipelines. An ongoing supply chain attack is targeting the ...
Operators of a new Remote Access Trojan (RAT) are exploiting the Telegram service to maintain control of their malware. Dubbed ToxicEye, the RAT abuses Telegram as part of command-and-control (C2) ...
Hackers have been found deploying an unfinished Russian malware, written in Golang, that leverages Telegram as its command-and-control (C2) channel. Netskope Threat Labs, the research wing of the ...
The use of Telegram bots as exfiltration destinations for phished information increased by 800% between 2021 and 2022. The new data comes from security researchers at Cofense, who published a report ...
The Solana-based Telegram trading bot Solareum said it is permanently shutting down after insufficient funding and a recent security breach. “It is with a profound sense of regret that we announce the ...
Russian-language Telegram users are using a bot to automate end-to-end phishing campaigns against users of popular ecommerce sites like eBay, and spreading the resulting wealth in a corporate-like ...