A newly discovered Golang backdoor is abusing Telegram for communication with its command-and-control (C&C) server.
A Golang backdoor is using Telegram as its command and control (C2) channel, an approach that makes detection harder for defenders, according to Netskope researchers ...
DEEP#DRIVE: Massive Cyber Espionage Operation A large-scale cyberattack, known as DEEP#DRIVE, has been launched against South ...
New Golang malware leverages Telegram for C2, executing PowerShell commands and self-destructing to evade detection.
On June 3rd, 2023, a pack of 27 animated stickers for Telegram named "NekoChan," with the ID "NekoWaifu," was added to Chpic.sui [1] The sticker pack was installed over 2,700 times in January 2025.
The UltraVNC executable is given the name "OneDrivers.exe" in a likely effort to evade detection by passing it off as a binary associated with Microsoft OneDrive. Knownsec 404 said the activity shares ...
SEOUL – A Telegram crime ring that sexually exploited over 234 individuals, including 159 minors, since 2020 has been busted by the police in Seoul, in what is believed to be one of the largest ...