News
A malicious Go module disguises itself as a brute force tool for SSH, but secretly steals the credentials it finds and ...
However, what makes it really stand out from the crowd is its C2 infrastructure - it uses a special function to create a bot instance, using a Telegram API token generated via Botfather.
Ransomware which abuses the Telegram app API has been stopped in its tracks only weeks after discovery. The malware, TeleCrypt, is typical ransomware in the way that the malicious code operates ...
Telegram has rolled out a new upgrade on its NFT ecosystem to improve trading of non-fungible token stickers and other digital assets.
YdX will roll out Telegram trading in September 2025 while rebranding and upgrading its platform as earnings decline.
The details are transmitted to a threat actor-controlled Telegram bot named "@sshZXC_bot" (ssh_bot) via the API, which then acknowledges the receipt of the credentials. The messages are sent through ...
Hackers could leverage the Telegram API, a tool developers use to create and upload content, to make harmful files appear as harmless video clips.
This info-stealer has been discovered to be actively advertised across various online platforms, including Telegram, which broadens its reach making it available to a wide audience of potential ...
A zero-day vulnerability in Telegram Messenger allowed attackers to spread a new form of malware with abilities ranging from creating a backdoor trojan to mining cryptocurrency. The attacks take ...
In the meantime, these are some of the third-party Telegram apps available in the Windows Phone Store using the Telegram API. Keep in mind most of these apps are very similar in functionality so ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results