TeleMessage Mayhem: When National Security Chats Go Rogue!

CISA highlights a vulnerability in TeleMessage, an app linked to Mike Waltz. This flaw, exploited by hackers, exposes unencrypted messages. Smarsh, the owner, is investigating. Users are advised to stop using the app, as end-to-end encryption claims fell flat. Signalgate 2.0? More like Signal-Oops!

Pro Dashboard

Hot Take:

TeleMessage: Where National Security Meets Comedy of Errors — Who knew that national security could double as a sitcom? Mike Waltz probably didn’t get the memo that “Signal” is not a TV show, and TeleMessage seems more like a telegraph from the Wild West than a secure messaging app. It’s a classic case of cybersecurity whack-a-mole, and it seems like the hackers are winning all the plushies.

Key Points:

  • Mike Waltz’s use of messaging apps led to security incidents, including the infamous ‘Signalgate’.
  • TeleMessage, used by Waltz, had vulnerabilities that allowed hackers to access unencrypted chat logs.
  • TeleMessage’s security claims were debunked; it failed to provide end-to-end encryption.
  • The vulnerability, CVE-2025-47729, is now on CISA’s Known Exploited Vulnerabilities list.
  • Federal agencies must address this vulnerability within three weeks, but TeleMessage use is advised against.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?