News

Attackers are actively attempting to exploit a vulnerability that exists in older versions of the Signal message app clone ...
GreyNoise said over 2,000 IP addresses have scanned for Spring Boot Actuator endpoints in the past 90 days. Of them, 1,582 ...
Hackers continue to try to exploit a forked signal app that is used to archive sensitive messages for compliance purposes, ...
Researchers are seeing exploitation attempts for the CVE-2025-48927 vulnerability in the TeleMessage SGNL app, which allows retrieving usernames, passwords, and other sensitive data.
TeleMessage, which was acquired by Oregon-based Smarsh in 2024, says it's shut the app down for now. "TeleMessage is investigating a potential security incident," a company spokesperson told The ...
What they're saying: "TeleMessage is investigating a potential security incident," a spokesperson for Smarsh, which owns the app, told CNBC in a statement.
Smarsh acquired Israel-based TeleMessage last year. 404 Media, a tech-focused news outlet, first reported on the hack affecting TeleMessage.
The extent of the hack is unclear. A Smarsh spokesperson did not immediately respond to questions about what data, if any, the hackers took. Smarsh acquired Israel-based TeleMessage last year.
The extent of the hack is unclear. A Smarsh spokesperson did not immediately respond to questions about what data, if any, the hackers took. Smarsh acquired Israel-based TeleMessage last year.