telegram

Back Open Paginator
30.09.2025 13:01
itsecbot (@itsecbot@schleuss.online)

Dutch teens recruited on Telegram, accused of Russia-backed hacking plot - Two 17-year-olds have been arrested by Dutch authorities on suspicion of spying for pro-R... bitdefender.com/en-us/blog/hot #netherlands #guestblog #lawℴ #telegram #russia #wi-fi




Show Original Post


30.09.2025 12:00
alejandrosoriano (@alejandrosoriano@mastodon.social)

¿Quieres estar al tanto de todas mis novedades? Únete a mi canal de Telegram y recibe mis actualizaciones en tu móvil al instante. ¡No esperes más y únete!

✈️ t.me/AlejandroSorianoVisuals




Show Original Post


30.09.2025 11:02
techbot (@techbot@social.raytec.co)

Eye of the Storm: Analyzing DarkCloud's Latest Capabilities

eSentire's Threat Response Unit detected a spear-phishing campaign targeting a manufacturing customer, attempting to deliver the DarkCloud information-stealing malware. The malware, distributed through a malicious zip archive, has undergone significant updates including a VB6 rewrite and enhanced evasion techniques. DarkCloud targets various data types including browser credentials, keystrokes, FTP credentials, and cryptocurrency wallets. The malware employs sophisticated evasion methods to avoid detection by sandboxes and security researchers. It supports multiple exfiltration methods including SMTP, Telegram, FTP, and Web Panel. The report provides detailed technical analysis of DarkCloud's functionality, distribution methods, and evasion techniques.

Pulse ID: 68da52920ea4c26c967e296b
Pulse Link: otx.alienvault.com/pulse/68da5
Pulse Author: AlienVault
Created: 2025-09-29 09:34:10

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#Browser #Cloud #CyberSecurity #InfoSec #Malware #Manufacturing #OTX #OpenThreatExchange #Phishing #RAT #SpearPhishing #Telegram #ThreatResponseUnit #ZIP #bot #cryptocurrency #eSentire #AlienVault




Show Original Post


29.09.2025 19:51
tugatech (@tugatech@masto.pt)

Governo britânico apoia Jaguar Land Rover com 1,77 mil milhões de euros após ciberataque devastador
🔗 tugatech.com.pt/t72097-governo

#ataque #ciberataque #ransomware #servidores #telegram 




Show Original Post


29.09.2025 17:04
WhisprNews (@WhisprNews@mastodon.social)

🇫🇷 La inteligencia francesa habría presionado a sobre las elecciones en Moldavia, según Pavel Durov. El cofundador de la aplicación de mensajería denuncia intentos de censura a cambio de favores.




Show Original Post


29.09.2025 16:52
Grub_09 (@Grub_09@mastodon.uno)

Gli USA vogliono hackerare Telegram!
Il Dipartimento di Giustizia degli Stati Uniti ha ricevuto l’autorizzazione del tribunale per condurre un’ispezione a distanza dei server di Telegram nell’ambito di un’indagine sullo sfruttamento minorile. La mozione del pubblico ministero ha affermato che questa misura era necessaria a causa del rifiuto dell’azienda di collaborare con le forze dell’ordine e di rispondere alle indagini ufficiali.

@sicurezza #usa #telegram #hacking

redhotcyber.com/post/gli-usa-h




Show Original Post


29.09.2025 15:56
mac4ever (@mac4ever@mastodon.social)

Le patron de Telegram accuse à nouveau la France d'ingérence, cette fois en Moldavie
mac4ever.com/192121





Show Original Post


29.09.2025 12:59
dwloewe (@dwloewe@social.tchncs.de)

hat jemand eine Empfehlung, wie ich #telegram|-Nachrichten wieder auf meinem Desktop-PC betrachten & beantworten kann? telegram-desktop ist aus dem #Debian repository rausgeschmissen worden..




Show Original Post


29.09.2025 11:11
ukraine (@ukraine@masto.ai)

📰 Говорив із Генеральним секретарем НАТО Марком Рютте

🔗 t.me/V_Zelenskiy_official/1628

#RussianInvasion #RussianWar #Telegram #Ukraine #Video #Zelensky




Show Original Post


29.09.2025 11:05
techbot (@techbot@social.raytec.co)

Olymp Loader: A new Malware-as-a-Service written in Assembly

Olymp Loader is a recently emerged Malware-as-a-Service offering advertised on underground forums since June 2025. Developed by a team called OLYMPO, it's written in assembly language and marketed as fully undetectable. The loader executes other malware on victim systems and provides built-in stealer modules for browsers, Telegram, and crypto wallets. It enables rapid feature updates and fast adoption by cybercriminals. The malware has evolved from an initial botnet concept to focus on loader and crypter functionalities. Distribution methods include disguising as legitimate software and using other malware like Amadey as initial access. Post-infection payloads primarily include credential stealers and remote access tools.

Pulse ID: 68da3df06737479fcd9566b9
Pulse Link: otx.alienvault.com/pulse/68da3
Pulse Author: AlienVault
Created: 2025-09-29 08:06:08

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#Amadey #Browser #CyberSecurity #InfoSec #Malware #MalwareAsAService #OTX #OpenThreatExchange #Telegram #bot #botnet #AlienVault




Show Original Post


29.09.2025 10:57
ukraine (@ukraine@masto.ai)

📰 Поговорив із Прем’єр-міністром Норвегії Йонасом Гар Стере

🔗 t.me/V_Zelenskiy_official/1628

#RussianInvasion #RussianWar #Telegram #Ukraine #Video #Zelensky




Show Original Post


29.09.2025 10:43
ukraine (@ukraine@masto.ai)

📰 Понад 12 годин тривала масована російська атака на Україну

🔗 t.me/V_Zelenskiy_official/1627

#RussianInvasion #RussianWar #Telegram #Ukraine #Video #Zelensky




Show Original Post


1 ...307 308 309 310 311 312 313 314 315 316 317 ...381
UP