News

A malicious Go module disguises itself as a brute force tool for SSH, but secretly steals the credentials it finds and ...
The details are transmitted to a threat actor-controlled Telegram bot named "@sshZXC_bot" (ssh_bot) via the API, which then ...
However, what makes it really stand out from the crowd is its C2 infrastructure - it uses a special function to create a bot instance, using a Telegram API token generated via Botfather.
Ransomware which abuses the Telegram app API has been stopped in its tracks only weeks after discovery. The malware, TeleCrypt, is typical ransomware in the way that the malicious code operates ...
A weakness in the protection of messages delivered using the Telegram Bot API gave researchers access to the communication flow between a piece of malware and its operator.
This info-stealer has been discovered to be actively advertised across various online platforms, including Telegram, which broadens its reach making it available to a wide audience of potential ...
A zero-day vulnerability in Telegram Messenger allowed attackers to spread a new form of malware with abilities ranging from creating a backdoor trojan to mining cryptocurrency. The attacks take ...
In the meantime, these are some of the third-party Telegram apps available in the Windows Phone Store using the Telegram API. Keep in mind most of these apps are very similar in functionality so ...