Threat actors are using Telegram as command and control (C2) channel for a new Golang malware variant, according to a Netskope report. The malware, believed to be of Russian origin, acts like a ...
Threat actor exploits Fastlane plugin trust to redirect Telegram traffic via C2 server after Vietnam’s ban, targeting mobile app CI/CD pipelines. An ongoing supply chain attack is targeting the ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results