TeleMessage Mayhem: When National Security Chats Go Rogue!
CISA highlights a vulnerability in TeleMessage, an app linked to Mike Waltz. This flaw, exploited by hackers, exposes unencrypted messages. Smarsh, the owner, is investigating. Users are advised to stop using the app, as end-to-end encryption claims fell flat. Signalgate 2.0? More like Signal-Oops!

Hot Take:
TeleMessage: Where National Security Meets Comedy of Errors — Who knew that national security could double as a sitcom? Mike Waltz probably didn’t get the memo that “Signal” is not a TV show, and TeleMessage seems more like a telegraph from the Wild West than a secure messaging app. It’s a classic case of cybersecurity whack-a-mole, and it seems like the hackers are winning all the plushies.
Key Points:
- Mike Waltz’s use of messaging apps led to security incidents, including the infamous ‘Signalgate’.
- TeleMessage, used by Waltz, had vulnerabilities that allowed hackers to access unencrypted chat logs.
- TeleMessage’s security claims were debunked; it failed to provide end-to-end encryption.
- The vulnerability, CVE-2025-47729, is now on CISA’s Known Exploited Vulnerabilities list.
- Federal agencies must address this vulnerability within three weeks, but TeleMessage use is advised against.
Already a member? Log in here