How Check Point says Hackers can gain remote access to WhatsApp and Telegram

“The exploitation of this vulnerability starts with the attacker sending an innocent looking file to the victim, which contains malicious code, Once the user clicks to open it, the malicious file allows the attacker to access WhatsApp’s and Telegram’s local storage, where user data is stored” Check Point explaining in a blog post the security […]