News
Attackers are actively attempting to exploit a vulnerability that exists in older versions of the Signal message app clone ...
Researchers are seeing exploitation attempts for the CVE-2025-48927 vulnerability in the TeleMessage SGNL app, which allows ...
Hackers continue to try to exploit a forked signal app that is used to archive sensitive messages for compliance purposes, ...
GreyNoise said over 2,000 IP addresses have scanned for Spring Boot Actuator endpoints in the past 90 days. Of them, 1,582 ...
"All other Smarsh products and services remain fully operational." Data stolen by the hacker includes the contents of messages sent using TeleMessage's versions of Signal, WhatsApp, Telegram and ...
"All other Smarsh products and services remain fully operational." Data stolen by the hacker includes the contents of messages sent using TeleMessage's versions of Signal, WhatsApp, Telegram and ...
A spokesperson for Smarsh, the company that owns TeleMessage, said Monday that the company “is investigating a potential security incident.
The extent of the hack is unclear. A Smarsh spokesperson did not immediately respond to questions about what data, if any, the hackers took. Smarsh acquired Israel-based TeleMessage last year.
The extent of the hack is unclear. A Smarsh spokesperson did not immediately respond to questions about what data, if any, the hackers took. Smarsh acquired Israel-based TeleMessage last year.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results