Company Details
telemessage
99
6,112
517
telemessage.com
0
TEL_1487638
In-progress

TeleMessage, a Smarsh Company Company CyberSecurity Posture
telemessage.comTeleMessage, a Smarsh Company, is Transforming Business Mobile Messaging and Archiving: Managed, Secure, Reliable and IT Ready. The TeleMessage Mobile Archiver effectively addresses compliance, regulatory and eDiscovery response requirements. It reduces risk across a variety of industries, capturing mobile content from any combination of device or carrier and supporting phone ownership either by company or BYOD. We’ve also developed an innovative, all-encompassing messaging suite for enterprises that replicates the ease of use of consumer applications, while providing all the additional tools that businesses need in order to stay on top of corporate mobile messaging. Our offering includes an integrated Android/iOS mobile apps, web portal, Outlook Plug-in, and a range of APIs that connect to any operational IT system. We support archiving both On-prem and in the cloud, working with a wide variety of carriers. TeleMessage has been providing state-of-the-art messaging solutions for over 15 years. Our software has been successfully deployed and used by thousands of enterprises, trusted by dozens of telecom operators, reaches hundreds of millions of users and powers billions of messages through customers’ networks. We support an ever growing number of enterprises, including leading brands across a range of industries such as healthcare, travel, finance and retail, among others.
Company Details
telemessage
99
6,112
517
telemessage.com
0
TEL_1487638
In-progress
Between 0 and 549

TSC Global Score (TPRM)XXXX

Description: An attack on the messaging service TeleMessage, which is used by some officials of the Trump administration, has resulted in the leak of details of over 60 government workers, a White House staffer, and members of the Secret Service. The White House acknowledged the cyber security incident but did not provide further comments. TeleMessage servers are reportedly closed while an investigation is carried out.
Description: TeleMessage, an enterprise communications and archiving platform used by US government officials, was compromised when a hacker gained unauthorized access and exfiltrated private message archives. The attacker claimed to have broken into the service, obtaining files that contained user communications across SMS, MMS, voice calls and messages from apps like WhatsApp, WeChat, Telegram and Signal. Although the stolen data included private conversations, no messages from US government accounts or officials were found in the breach. The hack was confirmed when portions of the archive were reviewed by a security publication, verifying the authenticity of the stolen content. Details on the attack vector remain unclear: it is not known whether a zero-day vulnerability was exploited, or if malware or credential theft played a role. TeleMessage and US authorities have yet to comment publicly, while Signal has warned users about the risks of unofficial forks of its application. The incident raises concerns over the security of third-party messaging services, potential regulatory compliance lapses and the exposure of sensitive personal communications on a platform that had been chosen for its supposed privacy features.
Description: A serious flaw in TM SGNL, a messaging app by US-Israeli firm TeleMessage used by former Trump administration officials, has been exploited, exposing sensitive communications and backend data. The breach compromised the platform’s core security claims, raising concerns about the encryption model and the security of high-level communications. The vulnerability was added to CISA's Known Exploited Vulnerabilities (KEV) list, with a three-week deadline for federal agencies to address the issue.
Description: TeleMessage, a secure messaging platform used by government agencies and enterprises, suffered a significant cybersecurity breach due to critical security failures. The attack exploited multiple vulnerabilities, including the **lack of end-to-end encryption**, **misconfigured systems**, **exposed endpoints**, and **outdated technology**, allowing unauthorized access to sensitive communications. The breach compromised proprietary and potentially classified data, raising concerns about national security risks given the platform’s use by government entities. The incident highlighted systemic weaknesses in TeleMessage’s security posture, particularly in **authentication protocols**, **data storage security**, and **governance compliance**. Unlike marketing claims, the platform failed to enforce modern safeguards such as **multi-factor authentication (MFA)** or **rigorous encryption at rest**, leaving archived messages vulnerable to interception and exfiltration. The breach underscored the dangers of **bolted-on security** rather than a **security-by-design** approach, exposing users—including high-profile government and corporate clients—to data leaks, espionage risks, and reputational damage. The fallout extended beyond immediate data exposure, as the breach eroded trust in TeleMessage’s ability to protect critical communications, potentially leading to **contract terminations**, **legal repercussions**, and **operational disruptions** for affected organizations. The incident also occurred during a **government shutdown**, compounding risks due to reduced oversight and delayed incident response.
Description: Researchers have observed multiple exploitation attempts for the CVE-2025-48927 vulnerability in the TeleMessage SGNL app, which allows retrieving usernames, passwords, and other sensitive data. The vulnerability is caused by exposing the '/heapdump' endpoint from Spring Boot Actuator without authentication. This flaw lets an attacker download a full Java heap memory dump, which may contain plaintext usernames, passwords, tokens, and other sensitive data. The issue was addressed by TeleMessage, but some on-premises installations remain vulnerable. The event triggered national security concerns in the U.S. after it was revealed that the product was being used by Customs & Border Protection and officials, including Mike Waltz.


TeleMessage, a Smarsh Company has 733.33% more incidents than the average of same-industry companies with at least one recorded incident.
TeleMessage, a Smarsh Company has 681.25% more incidents than the average of all companies with at least one recorded incident.
TeleMessage, a Smarsh Company reported 5 incidents this year: 1 cyber attacks, 0 ransomware, 1 vulnerabilities, 3 data breaches, compared to industry peers with at least 1 incident.
TSC cyber incidents detection timeline including parent company and subsidiaries

TeleMessage, a Smarsh Company, is Transforming Business Mobile Messaging and Archiving: Managed, Secure, Reliable and IT Ready. The TeleMessage Mobile Archiver effectively addresses compliance, regulatory and eDiscovery response requirements. It reduces risk across a variety of industries, capturing mobile content from any combination of device or carrier and supporting phone ownership either by company or BYOD. We’ve also developed an innovative, all-encompassing messaging suite for enterprises that replicates the ease of use of consumer applications, while providing all the additional tools that businesses need in order to stay on top of corporate mobile messaging. Our offering includes an integrated Android/iOS mobile apps, web portal, Outlook Plug-in, and a range of APIs that connect to any operational IT system. We support archiving both On-prem and in the cloud, working with a wide variety of carriers. TeleMessage has been providing state-of-the-art messaging solutions for over 15 years. Our software has been successfully deployed and used by thousands of enterprises, trusted by dozens of telecom operators, reaches hundreds of millions of users and powers billions of messages through customers’ networks. We support an ever growing number of enterprises, including leading brands across a range of industries such as healthcare, travel, finance and retail, among others.


Liberty Global is a world leader in converged broadband, video and mobile communications and an active investor in cutting-edge infrastructure, content and technology ventures. With our investments in fibre-based and 5G networks we play a vital role in society, currently providing over 85 million f

Reliance Communications Limited, founded by the late Shri Dhirubhai H Ambani (1932-2002), has Corporate clientele that includes 40,000 Indian and multinational corporations, including small and medium enterprises. Reliance Communications has established a pan-India, Next-Generation, digital network

T-Mobile US, Inc. (NASDAQ: TMUS) is America’s supercharged Un-carrier, delivering an advanced 4G LTE and transformative nationwide 5G network that will offer reliable connectivity for all. T-Mobile’s customers benefit from its unmatched combination of value and quality, unwavering obsession with off
Orange is one of the world’s leading telecommunications operators with revenues of 40.3 billion euros in 2024 and 127,000 employees worldwide at 31 December 2024, including 71,000 employees in France. The Group has a total customer base of 291 million customers worldwide at 31 December 2024, inclu

The future of mobile isn’t on the horizon, it’s happening now. At Ericsson, we’re building the foundation for an open network ecosystem where industries, developers, and enterprises thrive. The convergence of 5G, AI, cloud, and network APIs isn’t just a technological shift; it’s a transformation th
Charter Communications, Inc. (NASDAQ: CHTR) is a leading broadband connectivity company and cable operator with services available to more than 57 million homes and businesses in 41 states through its Spectrum brand. Over an advanced communications network, the company offers a full range of state-o
At Nokia, we create technology that helps the world act together. As a B2B technology innovation leader, we are pioneering the future where networks meet cloud to realize the full potential of digital in every industry. Through networks that sense, think and act, we work with our customers and pa

At TELUS, our purpose-driven team works together every day to innovate and do good. From providing technology solutions that make our lives safer and easier, to supporting those who need it most, our inclusive, spirited and giving people are passionate about empowering our customers, communities and

Idea Cellular is an Aditya Birla Group Company, India's first truly multinational corporation. Idea is a pan-India integrated GSM operator offering 2G and 3G services, and has its own NLD and ILD operations, and ISP license. With revenue in excess of $4 billion; revenue market share of 18%; and subs
.png)
On the 4th of May 2025, TeleMessage, an Israeli company providing modified versions of encrypted messaging apps like Signal,...
Portland-based tech firm Smarsh has stopped offering a digital messaging app called TeleMessage, notably used by Trump administration official Mike Waltz,...
Portland company Smarsh faces scrutiny as its TeleMessage business is hacked, compromising messages including those of Mike Waltz.
Hackers say they have breached the message archiving system Trump officials have adopted since the Signal chat debacle in March.
TeleMessage, the app that President Trump's former National Security Advisor, Mike Waltz, appeared to use to archive his group chats,...
TeleMessage, the message-archiving app that former National Security Adviser Michael Waltz appeared to be using in a photograph of him communicating with other...
A messaging app used by now-former national security advisor Mike Waltz has been hacked, prompting questions about the current Trump administration's...
Trump previously discouraged his officials from using Signal following "Signalgate," when Mike Waltz added a journalist to a private chat of...
TM SGNL, a chat app by US-Israeli firm TeleMessage used by Trump officials, halts operations after a breach exposed messages and backend data.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of TeleMessage, a Smarsh Company is http://www.telemessage.com.
According to Rankiteo, TeleMessage, a Smarsh Company’s AI-generated cybersecurity score is 548, reflecting their Critical security posture.
According to Rankiteo, TeleMessage, a Smarsh Company currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, TeleMessage, a Smarsh Company is not certified under SOC 2 Type 1.
According to Rankiteo, TeleMessage, a Smarsh Company does not hold a SOC 2 Type 2 certification.
According to Rankiteo, TeleMessage, a Smarsh Company is not listed as GDPR compliant.
According to Rankiteo, TeleMessage, a Smarsh Company does not currently maintain PCI DSS compliance.
According to Rankiteo, TeleMessage, a Smarsh Company is not compliant with HIPAA regulations.
According to Rankiteo,TeleMessage, a Smarsh Company is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
TeleMessage, a Smarsh Company operates primarily in the Telecommunications industry.
TeleMessage, a Smarsh Company employs approximately 99 people worldwide.
TeleMessage, a Smarsh Company presently has no subsidiaries across any sectors.
TeleMessage, a Smarsh Company’s official LinkedIn profile has approximately 6,112 followers.
TeleMessage, a Smarsh Company is classified under the NAICS code 517, which corresponds to Telecommunications.
No, TeleMessage, a Smarsh Company does not have a profile on Crunchbase.
Yes, TeleMessage, a Smarsh Company maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/telemessage.
As of December 01, 2025, Rankiteo reports that TeleMessage, a Smarsh Company has experienced 5 cybersecurity incidents.
TeleMessage, a Smarsh Company has an estimated 9,579 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
A vulnerability was determined in motogadget mo.lock Ignition Lock up to 20251125. Affected by this vulnerability is an unknown functionality of the component NFC Handler. Executing manipulation can lead to use of hard-coded cryptographic key . The physical device can be targeted for the attack. A high complexity level is associated with this attack. The exploitation appears to be difficult. The vendor was contacted early about this disclosure but did not respond in any way.
OrangeHRM is a comprehensive human resource management (HRM) system. From version 5.0 to 5.7, the interview attachment retrieval endpoint in the Recruitment module serves files based solely on an authenticated session and user-supplied identifiers, without verifying whether the requester has permission to access the associated interview record. Because the server does not perform any recruitment-level authorization checks, an ESS-level user with no access to recruitment workflows can directly request interview attachment URLs and receive the corresponding files. This exposes confidential interview documents—including candidate CVs, evaluations, and supporting files—to unauthorized users. The issue arises from relying on predictable object identifiers and session presence rather than validating the user’s association with the relevant recruitment process. This issue has been patched in version 5.8.
OrangeHRM is a comprehensive human resource management (HRM) system. From version 5.0 to 5.7, the application’s recruitment attachment retrieval endpoint does not enforce the required authorization checks before serving candidate files. Even users restricted to ESS-level access, who have no permission to view the Recruitment module, can directly access candidate attachment URLs. When an authenticated request is made to the attachment endpoint, the system validates the session but does not confirm that the requesting user has the necessary recruitment permissions. As a result, any authenticated user can download CVs and other uploaded documents for arbitrary candidates by issuing direct requests to the attachment endpoint, leading to unauthorized exposure of sensitive applicant data. This issue has been patched in version 5.8.
OrangeHRM is a comprehensive human resource management (HRM) system. From version 5.0 to 5.7, the application does not invalidate existing sessions when a user is disabled or when a password change occurs, allowing active session cookies to remain valid indefinitely. As a result, a disabled user, or an attacker using a compromised account, can continue to access protected pages and perform operations as long as a prior session remains active. Because the server performs no session revocation or session-store cleanup during these critical state changes, disabling an account or updating credentials has no effect on already-established sessions. This makes administrative disable actions ineffective and allows unauthorized users to retain full access even after an account is closed or a password is reset, exposing the system to prolonged unauthorized use and significantly increasing the impact of account takeover scenarios. This issue has been patched in version 5.8.
OrangeHRM is a comprehensive human resource management (HRM) system. From version 5.0 to 5.7, the password reset workflow does not enforce that the username submitted in the final reset request matches the account for which the reset process was originally initiated. After obtaining a valid reset link for any account they can receive email for, an attacker can alter the username parameter in the final reset request to target a different user. Because the system accepts the supplied username without verification, the attacker can set a new password for any chosen account, including privileged accounts, resulting in full account takeover. This issue has been patched in version 5.8.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.