Signal App Clone Vulnerability Actively Exploited for Password Theft

Signal App Clone Vulnerability Actively Exploited for Password Theft A critical vulnerability in TeleMessageTM SGNL, an enterprise messaging platform modeled after Signal, is being actively exploited by threat actors to steal passwords andsensitive datafrom government agencies and enterprises. The flaw, tracked as CVE-2025-48927, was added to CISA’s Known Exploited Vulnerabilities catalog on July 14th, indicating widespread exploitation in the wild. Vulnerability Details CVE-2025-48927 affects c...

Save to Folder

Choose a folder to save this article: