{"id":11728,"date":"2024-08-03T15:16:57","date_gmt":"2024-08-03T09:46:57","guid":{"rendered":"https:\/\/reconcybersecurity.com\/blogs\/?post_type=web-story&#038;p=11728"},"modified":"2024-08-03T15:16:57","modified_gmt":"2024-08-03T09:46:57","slug":"the-telegram-application-security-breach-recon-cyber-security","status":"publish","type":"web-story","link":"https:\/\/reconcybersecurity.com\/blogs\/web-stories\/the-telegram-application-security-breach-recon-cyber-security\/","title":{"rendered":"The Telegram Application Security Breach &#8211; Recon Cyber Security"},"content":{"rendered":"<p><html amp=\"\" lang=\"en\"><head><meta charSet=\"utf-8\"\/><meta name=\"viewport\" content=\"width=device-width,minimum-scale=1,initial-scale=1\"\/><script async=\"\" src=\"https:\/\/cdn.ampproject.org\/v0.js\"><\/script><script async=\"\" src=\"https:\/\/cdn.ampproject.org\/v0\/amp-story-1.0.js\" custom-element=\"amp-story\"><\/script><link href=\"https:\/\/fonts.googleapis.com\/css2?display=swap&amp;family=Roboto%3Awght%40400%3B700\" rel=\"stylesheet\"\/><link href=\"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/Viral-Videos-to-Viruses-Telegram-App-Security-Breach-Explained-Best-Cyber-Security-Course-in-Delhi.jpg\" rel=\"preload\" as=\"image\"\/>\n<style amp-boilerplate=\"\">body{-webkit-animation:-amp-start 8s steps(1,end) 0s 1 normal both;-moz-animation:-amp-start 8s steps(1,end) 0s 1 normal both;-ms-animation:-amp-start 8s steps(1,end) 0s 1 normal both;animation:-amp-start 8s steps(1,end) 0s 1 normal both}@-webkit-keyframes -amp-start{from{visibility:hidden}to{visibility:visible}}@-moz-keyframes -amp-start{from{visibility:hidden}to{visibility:visible}}@-ms-keyframes -amp-start{from{visibility:hidden}to{visibility:visible}}@-o-keyframes -amp-start{from{visibility:hidden}to{visibility:visible}}@keyframes -amp-start{from{visibility:hidden}to{visibility:visible}}<\/style>\n<p><noscript><\/p>\n<style amp-boilerplate=\"\">body{-webkit-animation:none;-moz-animation:none;-ms-animation:none;animation:none}<\/style>\n<p><\/noscript><\/p>\n<style amp-custom=\"\">\n              h1, h2, h3 { font-weight: normal; }<\/p>\n<p>              amp-story-page {\n                background-color: #131516;\n              }<\/p>\n<p>              amp-story-grid-layer {\n                overflow: visible;\n              }<\/p>\n<p>              @media (max-aspect-ratio: 9 \/ 16)  {\n                @media (min-aspect-ratio: 320 \/ 678) {\n                  amp-story-grid-layer.grid-layer {\n                    margin-top: calc((100% \/ 0.5625 - 100% \/ 0.6666666666666666) \/ 2);\n                  }\n                }\n              }<\/p>\n<p>              @media not all and (min-resolution:.001dpcm) {\n                @media {\n                  p.text-wrapper > span {\n                    font-size: calc(100% - 0.5px);\n                  }\n                }\n              }<\/p>\n<p>              .page-fullbleed-area,\n              .page-background-overlay-area {\n                position: absolute;\n                overflow: hidden;\n                width: 100%;\n                left: 0;\n                height: calc(1.1851851851851851 * 100%);\n                top: calc((1 - 1.1851851851851851) * 100% \/ 2);\n              }<\/p>\n<p>              .element-overlay-area {\n                position: absolute;\n                width: 100%;\n                height: 100%;\n                top: 0;\n                left: 0;\n              }<\/p>\n<p>              .page-safe-area {\n                overflow: visible;\n                position: absolute;\n                top: 0;\n                bottom: 0;\n                left: 0;\n                right: 0;\n                width: 100%;\n                height: calc(0.84375 * 100%);\n                margin: auto 0;\n              }<\/p>\n<p>              .mask {\n                position: absolute;\n                overflow: hidden;\n              }<\/p>\n<p>              .fill {\n                position: absolute;\n                top: 0;\n                left: 0;\n                right: 0;\n                bottom: 0;\n                margin: 0;\n              }<\/p>\n<p>              @media (prefers-reduced-motion: no-preference) {\n                .animation-wrapper {\n                  opacity: var(--initial-opacity);\n                  transform: var(--initial-transform);\n                }\n              }<\/p>\n<p>              amp-story-grid-layer.align-bottom {\n                align-content: end;\n                padding: 0;\n                \/*\n                  AMP CTA Layer will exactly occupy 74px regardless of any device.\n                  To space out captions 74px from the BOTTOM (AMP CTA Layer),\n                  74px from the TOP should also be spaced out and thus: 2 * 74px\n                  will be the desired max-height.\n                *\/\n                max-height: calc(100vh - (2 * 74px));\n              }<\/p>\n<p>              .captions-area {\n                padding: 0 32px 0;\n              }<\/p>\n<p>              amp-story-captions {\n                margin-bottom: 16px;\n                text-align: center;\n              }<\/p>\n<p>              amp-story-audio-sticker {\n                height: 100%;\n              }<\/p>\n<p>              .audio-sticker {\n                font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, Oxygen-Sans, Ubuntu, Cantarell, 'Helvetica Neue', sans-serif;\n              }\n              <\/style>\n<p><meta name=\"web-stories-replace-head-start\"\/><title>The Telegram Application Security Breach &#8211; Recon Cyber Security<\/title><link rel=\"canonical\" href=\"https:\/\/reconcybersecurity.com\/blogs\/?post_type=web-story&amp;p=11728\"\/><meta name=\"web-stories-replace-head-end\"\/><\/head><body><amp-story standalone=\"\" publisher=\"Recon Cyber security\" publisher-logo-src=\"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/Recon-Cyber-Security.jpeg\" title=\"The Telegram Application Security Breach - Recon Cyber Security\" poster-portrait-src=\"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/cropped-Viral-Videos-to-Viruses-Telegram-App-Security-Breach-Explained-Best-Cyber-Security-Course-in-Delhi.jpg\"><amp-story-page id=\"62cec6ee-0cda-4e71-9501-1c0a16afa4d6\" auto-advance-after=\"10s\"><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\" style=\"background-color:#192479\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:0;top:-9.25926%;width:100%;height:118.51852%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" class=\"mask\" id=\"el-3d9768e9-490e-4ccf-befd-b61e2866cb95\">\n<div style=\"position:absolute;width:177.77778%;height:100%;left:-38.88889%;top:0%\" data-leaf-element=\"true\"><amp-img layout=\"fill\" src=\"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/Viral-Videos-to-Viruses-Telegram-App-Security-Breach-Explained-Best-Cyber-Security-Course-in-Delhi.jpg\" alt=\"Viral Videos to Viruses Telegram App Security Breach Explained Best Cyber Security Course in Delhi\" srcSet=\"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/Viral-Videos-to-Viruses-Telegram-App-Security-Breach-Explained-Best-Cyber-Security-Course-in-Delhi.jpg 1000w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/Viral-Videos-to-Viruses-Telegram-App-Security-Breach-Explained-Best-Cyber-Security-Course-in-Delhi-800x800.jpg 800w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/Viral-Videos-to-Viruses-Telegram-App-Security-Breach-Explained-Best-Cyber-Security-Course-in-Delhi-768x768.jpg 768w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/Viral-Videos-to-Viruses-Telegram-App-Security-Breach-Explained-Best-Cyber-Security-Course-in-Delhi-380x380.jpg 380w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/Viral-Videos-to-Viruses-Telegram-App-Security-Breach-Explained-Best-Cyber-Security-Course-in-Delhi-300x300.jpg 300w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/Viral-Videos-to-Viruses-Telegram-App-Security-Breach-Explained-Best-Cyber-Security-Course-in-Delhi-150x150.jpg 150w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/Viral-Videos-to-Viruses-Telegram-App-Security-Breach-Explained-Best-Cyber-Security-Course-in-Delhi-96x96.jpg 96w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/Viral-Videos-to-Viruses-Telegram-App-Security-Breach-Explained-Best-Cyber-Security-Course-in-Delhi-80x80.jpg 80w\" sizes=\"(min-width: 1024px) 45vh, 100vw\" disable-inline-width=\"true\"><\/amp-img><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:11.65049%;top:77.99353%;width:73.78641%;height:17.31392%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0;border-radius:0.6578947368421052% 0.6578947368421052% 0.6578947368421052% 0.6578947368421052% \/ 1.8691588785046727% 1.8691588785046727% 1.8691588785046727% 1.8691588785046727%\" id=\"el-dc25b470-a7b1-4ac2-8f18-74470fe800a3\">\n<h2 id=\"a-major-in-telegram-application-video-sharing-virus\" class=\"fill text-wrapper\" style=\"white-space:pre-line;overflow-wrap:break-word;word-break:break-word;margin:-0.13877467105263158% 0;font-family:&quot;Roboto&quot;,&quot;Helvetica Neue&quot;,&quot;Helvetica&quot;,sans-serif;font-size:0.485437em;line-height:1.2;text-align:left;padding:0;color:#000000\"><span><span style=\"font-weight: 700; color: #fff\">A major in Telegram Application video sharing virus<\/span><\/span><\/h2>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><\/amp-story-page><amp-story-page id=\"3eed3e92-a0a2-478b-9de8-dfc00743efaa\" auto-advance-after=\"10s\"><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\" style=\"background-color:#22222b\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:0;top:-9.25926%;width:100%;height:118.51852%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0\" class=\"mask\" id=\"el-9fa5068c-8b40-424e-8b79-1ce86e8a00d5\">\n<div style=\"position:absolute;width:100%;height:100.34843%;left:0%;top:-0.17422%\" data-leaf-element=\"true\"><amp-img layout=\"fill\" src=\"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/A-Virus-in-telegram-applicaiton-Recon-Cyber-Security-scaled.jpg\" alt=\"A Virus in telegram applicaiton - Recon Cyber Security\" srcSet=\"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/A-Virus-in-telegram-applicaiton-Recon-Cyber-Security-scaled.jpg 1435w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/A-Virus-in-telegram-applicaiton-Recon-Cyber-Security-1160x2070.jpg 1160w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/A-Virus-in-telegram-applicaiton-Recon-Cyber-Security-1148x2048.jpg 1148w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/A-Virus-in-telegram-applicaiton-Recon-Cyber-Security-861x1536.jpg 861w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/A-Virus-in-telegram-applicaiton-Recon-Cyber-Security-800x1427.jpg 800w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/A-Virus-in-telegram-applicaiton-Recon-Cyber-Security-768x1370.jpg 768w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/A-Virus-in-telegram-applicaiton-Recon-Cyber-Security-574x1024.jpg 574w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/A-Virus-in-telegram-applicaiton-Recon-Cyber-Security-380x678.jpg 380w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/A-Virus-in-telegram-applicaiton-Recon-Cyber-Security-168x300.jpg 168w,https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/A-Virus-in-telegram-applicaiton-Recon-Cyber-Security-150x268.jpg 150w\" sizes=\"(min-width: 1024px) 45vh, 100vw\" disable-inline-width=\"true\"><\/amp-img><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><amp-story-grid-layer template=\"vertical\" aspect-ratio=\"412:618\" class=\"grid-layer\"><\/p>\n<div class=\"page-fullbleed-area\">\n<div class=\"page-safe-area\">\n<div style=\"position:absolute;pointer-events:none;left:11.65049%;top:70.55016%;width:76.69903%;height:28.64078%;opacity:1\">\n<div style=\"pointer-events:initial;width:100%;height:100%;display:block;position:absolute;top:0;left:0;z-index:0;border-radius:0.6329113924050633% 0.6329113924050633% 0.6329113924050633% 0.6329113924050633% \/ 1.1299435028248588% 1.1299435028248588% 1.1299435028248588% 1.1299435028248588%\" id=\"el-be2a74c0-5f3e-4eb2-88ec-e6200238ec8c\"><a href=\"https:\/\/reconcybersecurity.com\/blogs\/viral-videos-to-viruses-telegram-app-security-breach-explained-best-cyber-security-course-in-delhi\/\" data-tooltip-icon=\"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/Viral-Videos-to-Viruses-Telegram-App-Security-Breach-Explained-Best-Cyber-Security-Course-in-Delhi.jpg\" data-tooltip-text=\"Viral Videos to Viruses: Telegram App Security Breach Explained | Best Cyber Security Course in Delhi\" target=\"_blank\" rel=\"noreferrer noopener\" style=\"width:100%;height:100%;display:block;position:absolute;top:0;left:0\"><\/p>\n<h1 id=\"unveiling-the-vulnerability-how-the-telegram-flaw-was-discovered\" class=\"fill text-wrapper\" style=\"white-space:pre-line;overflow-wrap:break-word;word-break:break-word;margin:-0.16465585443037953% 0;font-family:&quot;Roboto&quot;,&quot;Helvetica Neue&quot;,&quot;Helvetica&quot;,sans-serif;font-size:0.598706em;line-height:1.2;text-align:left;padding:0;color:#000000\"><span><span style=\"color: #fff\">Unveiling the Vulnerability: How the Telegram Flaw Was Discovered<\/span><\/span><\/h1>\n<p><\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/amp-story-grid-layer><\/amp-story-page><\/amp-story><\/body><\/html><\/p>\n","protected":false},"excerpt":{"rendered":"Learn how a vulnerability in the Telegram app allowed cybercriminals to embed malware in videos. Discover the best cyber security courses in Delhi to protect yourself against such threats.\n","protected":false},"author":1,"featured_media":11733,"template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"web_stories_publisher_logo":11731,"web_stories_poster":[],"web_stories_products":[],"footnotes":""},"web_story_category":[],"web_story_tag":[],"class_list":["post-11728","web-story","type-web-story","status-publish","has-post-thumbnail"],"story_data":{"version":47,"pages":[{"elements":[{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":false,"scale":100,"focalX":50,"focalY":50,"resource":{"type":"image","mimeType":"image\/jpeg","width":1000,"height":1000,"sizes":{"medium":{"file":"Viral-Videos-to-Viruses-Telegram-App-Security-Breach-Explained-Best-Cyber-Security-Course-in-Delhi-300x300.jpg","width":300,"height":300,"filesize":11332,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/Viral-Videos-to-Viruses-Telegram-App-Security-Breach-Explained-Best-Cyber-Security-Course-in-Delhi-300x300.jpg"},"thumbnail":{"file":"Viral-Videos-to-Viruses-Telegram-App-Security-Breach-Explained-Best-Cyber-Security-Course-in-Delhi-150x150.jpg","width":150,"height":150,"filesize":4426,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/Viral-Videos-to-Viruses-Telegram-App-Security-Breach-Explained-Best-Cyber-Security-Course-in-Delhi-150x150.jpg"},"medium_large":{"file":"Viral-Videos-to-Viruses-Telegram-App-Security-Breach-Explained-Best-Cyber-Security-Course-in-Delhi-768x768.jpg","width":768,"height":768,"filesize":47271,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/Viral-Videos-to-Viruses-Telegram-App-Security-Breach-Explained-Best-Cyber-Security-Course-in-Delhi-768x768.jpg"},"cnvs-small":{"file":"Viral-Videos-to-Viruses-Telegram-App-Security-Breach-Explained-Best-Cyber-Security-Course-in-Delhi-80x80.jpg","width":80,"height":80,"filesize":2088,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/Viral-Videos-to-Viruses-Telegram-App-Security-Breach-Explained-Best-Cyber-Security-Course-in-Delhi-80x80.jpg"},"cnvs-thumbnail":{"file":"Viral-Videos-to-Viruses-Telegram-App-Security-Breach-Explained-Best-Cyber-Security-Course-in-Delhi-300x225.jpg","width":300,"height":225,"filesize":9739,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/Viral-Videos-to-Viruses-Telegram-App-Security-Breach-Explained-Best-Cyber-Security-Course-in-Delhi-300x225.jpg"},"pk-small":{"file":"Viral-Videos-to-Viruses-Telegram-App-Security-Breach-Explained-Best-Cyber-Security-Course-in-Delhi-80x80.jpg","width":80,"height":80,"filesize":2088,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/Viral-Videos-to-Viruses-Telegram-App-Security-Breach-Explained-Best-Cyber-Security-Course-in-Delhi-80x80.jpg"},"pk-thumbnail":{"file":"Viral-Videos-to-Viruses-Telegram-App-Security-Breach-Explained-Best-Cyber-Security-Course-in-Delhi-300x225.jpg","width":300,"height":225,"filesize":9739,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/Viral-Videos-to-Viruses-Telegram-App-Security-Breach-Explained-Best-Cyber-Security-Course-in-Delhi-300x225.jpg"},"csco-small":{"file":"Viral-Videos-to-Viruses-Telegram-App-Security-Breach-Explained-Best-Cyber-Security-Course-in-Delhi-80x80.jpg","width":80,"height":80,"filesize":2088,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/Viral-Videos-to-Viruses-Telegram-App-Security-Breach-Explained-Best-Cyber-Security-Course-in-Delhi-80x80.jpg"},"csco-intermediate":{"file":"Viral-Videos-to-Viruses-Telegram-App-Security-Breach-Explained-Best-Cyber-Security-Course-in-Delhi-200x140.jpg","width":200,"height":140,"filesize":5465,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/Viral-Videos-to-Viruses-Telegram-App-Security-Breach-Explained-Best-Cyber-Security-Course-in-Delhi-200x140.jpg"},"csco-thumbnail":{"file":"Viral-Videos-to-Viruses-Telegram-App-Security-Breach-Explained-Best-Cyber-Security-Course-in-Delhi-380x220.jpg","width":380,"height":220,"filesize":10891,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/Viral-Videos-to-Viruses-Telegram-App-Security-Breach-Explained-Best-Cyber-Security-Course-in-Delhi-380x220.jpg"},"csco-thumbnail-alternative":{"file":"Viral-Videos-to-Viruses-Telegram-App-Security-Breach-Explained-Best-Cyber-Security-Course-in-Delhi-300x180.jpg","width":300,"height":180,"filesize":8235,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/Viral-Videos-to-Viruses-Telegram-App-Security-Breach-Explained-Best-Cyber-Security-Course-in-Delhi-300x180.jpg"},"csco-thumbnail-uncropped":{"file":"Viral-Videos-to-Viruses-Telegram-App-Security-Breach-Explained-Best-Cyber-Security-Course-in-Delhi-380x380.jpg","width":380,"height":380,"filesize":16034,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/Viral-Videos-to-Viruses-Telegram-App-Security-Breach-Explained-Best-Cyber-Security-Course-in-Delhi-380x380.jpg"},"csco-medium":{"file":"Viral-Videos-to-Viruses-Telegram-App-Security-Breach-Explained-Best-Cyber-Security-Course-in-Delhi-800x500.jpg","width":800,"height":500,"filesize":33098,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/Viral-Videos-to-Viruses-Telegram-App-Security-Breach-Explained-Best-Cyber-Security-Course-in-Delhi-800x500.jpg"},"csco-medium-alternative":{"file":"Viral-Videos-to-Viruses-Telegram-App-Security-Breach-Explained-Best-Cyber-Security-Course-in-Delhi-560x336.jpg","width":560,"height":336,"filesize":18973,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/Viral-Videos-to-Viruses-Telegram-App-Security-Breach-Explained-Best-Cyber-Security-Course-in-Delhi-560x336.jpg"},"csco-medium-uncropped":{"file":"Viral-Videos-to-Viruses-Telegram-App-Security-Breach-Explained-Best-Cyber-Security-Course-in-Delhi-800x800.jpg","width":800,"height":800,"filesize":50079,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/Viral-Videos-to-Viruses-Telegram-App-Security-Breach-Explained-Best-Cyber-Security-Course-in-Delhi-800x800.jpg"},"csco-large":{"file":"Viral-Videos-to-Viruses-Telegram-App-Security-Breach-Explained-Best-Cyber-Security-Course-in-Delhi-1000x680.jpg","width":1000,"height":680,"filesize":52734,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/Viral-Videos-to-Viruses-Telegram-App-Security-Breach-Explained-Best-Cyber-Security-Course-in-Delhi-1000x680.jpg"},"web-stories-poster-portrait":{"file":"Viral-Videos-to-Viruses-Telegram-App-Security-Breach-Explained-Best-Cyber-Security-Course-in-Delhi-640x853.jpg","width":640,"height":853,"filesize":42950,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/Viral-Videos-to-Viruses-Telegram-App-Security-Breach-Explained-Best-Cyber-Security-Course-in-Delhi-640x853.jpg"},"web-stories-publisher-logo":{"file":"Viral-Videos-to-Viruses-Telegram-App-Security-Breach-Explained-Best-Cyber-Security-Course-in-Delhi-96x96.jpg","width":96,"height":96,"filesize":2527,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/Viral-Videos-to-Viruses-Telegram-App-Security-Breach-Explained-Best-Cyber-Security-Course-in-Delhi-96x96.jpg"},"web-stories-thumbnail":{"file":"Viral-Videos-to-Viruses-Telegram-App-Security-Breach-Explained-Best-Cyber-Security-Course-in-Delhi-150x150.jpg","width":150,"height":150,"filesize":4426,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/Viral-Videos-to-Viruses-Telegram-App-Security-Breach-Explained-Best-Cyber-Security-Course-in-Delhi-150x150.jpg"},"full":{"file":"Viral-Videos-to-Viruses-Telegram-App-Security-Breach-Explained-Best-Cyber-Security-Course-in-Delhi.jpg","width":1000,"height":1000,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/Viral-Videos-to-Viruses-Telegram-App-Security-Breach-Explained-Best-Cyber-Security-Course-in-Delhi.jpg"}},"isPlaceholder":false,"isExternal":false,"needsProxy":false,"baseColor":"#192479","blurHash":"UK9[=lf*00V[u6jtVsa#00jZ_3kCNKa#s*oJ","creationDate":"2024-08-03T08:42:09","src":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/Viral-Videos-to-Viruses-Telegram-App-Security-Breach-Explained-Best-Cyber-Security-Course-in-Delhi.jpg","id":11726,"alt":"Viral Videos to Viruses Telegram App Security Breach Explained Best Cyber Security Course in Delhi","local":false,"provider":"local"},"x":0,"y":-59,"width":412,"height":732,"type":"image","mask":{"type":"rectangle","showInLibrary":true,"name":"Rectangle","path":"M 0,0 1,0 1,1 0,1 0,0 Z","ratio":1,"supportsBorder":true},"id":"3d9768e9-490e-4ccf-befd-b61e2866cb95","isBackground":true,"isHidden":false},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundTextMode":"NONE","font":{"family":"Roboto"},"fontSize":30,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"lineHeight":1.2,"textAlign":"left","padding":{"locked":true,"hasHiddenPadding":false,"horizontal":0,"vertical":0},"content":"<span style=\"font-weight: 700; color: #fff\">A major in Telegram Application video sharing virus<\/span>","x":48,"y":482,"width":304,"borderRadius":{"locked":true,"topLeft":2,"topRight":2,"bottomRight":2,"bottomLeft":2},"type":"text","height":107,"id":"dc25b470-a7b1-4ac2-8f18-74470fe800a3","marginOffset":0.84375}],"backgroundColor":{"color":{"r":255,"g":255,"b":255}},"id":"62cec6ee-0cda-4e71-9501-1c0a16afa4d6","defaultBackgroundElement":{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"x":1,"y":1,"width":1,"height":1,"mask":{"type":"rectangle"},"isBackground":true,"isDefaultBackground":true,"type":"shape","id":"966289c3-6d9b-445f-aba5-b5abf931568b"},"animations":[]},{"elements":[{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":false,"scale":100,"focalX":50,"focalY":50,"resource":{"type":"image","mimeType":"image\/jpeg","width":1435,"height":2560,"sizes":{"medium":{"file":"A-Virus-in-telegram-applicaiton-Recon-Cyber-Security-168x300.jpg","width":168,"height":300,"filesize":20892,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/A-Virus-in-telegram-applicaiton-Recon-Cyber-Security-168x300.jpg"},"large":{"file":"A-Virus-in-telegram-applicaiton-Recon-Cyber-Security-574x1024.jpg","width":574,"height":1024,"filesize":102530,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/A-Virus-in-telegram-applicaiton-Recon-Cyber-Security-574x1024.jpg"},"thumbnail":{"file":"A-Virus-in-telegram-applicaiton-Recon-Cyber-Security-150x150.jpg","width":150,"height":150,"filesize":14018,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/A-Virus-in-telegram-applicaiton-Recon-Cyber-Security-150x150.jpg"},"medium_large":{"file":"A-Virus-in-telegram-applicaiton-Recon-Cyber-Security-768x1370.jpg","width":768,"height":1370,"filesize":157452,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/A-Virus-in-telegram-applicaiton-Recon-Cyber-Security-768x1370.jpg"},"1536x1536":{"file":"A-Virus-in-telegram-applicaiton-Recon-Cyber-Security-861x1536.jpg","width":861,"height":1536,"filesize":186652,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/A-Virus-in-telegram-applicaiton-Recon-Cyber-Security-861x1536.jpg"},"2048x2048":{"file":"A-Virus-in-telegram-applicaiton-Recon-Cyber-Security-1148x2048.jpg","width":1148,"height":2048,"filesize":288708,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/A-Virus-in-telegram-applicaiton-Recon-Cyber-Security-1148x2048.jpg"},"cnvs-small":{"file":"A-Virus-in-telegram-applicaiton-Recon-Cyber-Security-80x80.jpg","width":80,"height":80,"filesize":9703,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/A-Virus-in-telegram-applicaiton-Recon-Cyber-Security-80x80.jpg"},"cnvs-thumbnail":{"file":"A-Virus-in-telegram-applicaiton-Recon-Cyber-Security-300x225.jpg","width":300,"height":225,"filesize":23429,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/A-Virus-in-telegram-applicaiton-Recon-Cyber-Security-300x225.jpg"},"pk-small":{"file":"A-Virus-in-telegram-applicaiton-Recon-Cyber-Security-80x80.jpg","width":80,"height":80,"filesize":9703,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/A-Virus-in-telegram-applicaiton-Recon-Cyber-Security-80x80.jpg"},"pk-thumbnail":{"file":"A-Virus-in-telegram-applicaiton-Recon-Cyber-Security-300x225.jpg","width":300,"height":225,"filesize":23429,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/A-Virus-in-telegram-applicaiton-Recon-Cyber-Security-300x225.jpg"},"csco-small":{"file":"A-Virus-in-telegram-applicaiton-Recon-Cyber-Security-80x80.jpg","width":80,"height":80,"filesize":9703,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/A-Virus-in-telegram-applicaiton-Recon-Cyber-Security-80x80.jpg"},"csco-intermediate":{"file":"A-Virus-in-telegram-applicaiton-Recon-Cyber-Security-200x140.jpg","width":200,"height":140,"filesize":15039,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/A-Virus-in-telegram-applicaiton-Recon-Cyber-Security-200x140.jpg"},"csco-thumbnail":{"file":"A-Virus-in-telegram-applicaiton-Recon-Cyber-Security-380x220.jpg","width":380,"height":220,"filesize":25295,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/A-Virus-in-telegram-applicaiton-Recon-Cyber-Security-380x220.jpg"},"csco-thumbnail-alternative":{"file":"A-Virus-in-telegram-applicaiton-Recon-Cyber-Security-300x180.jpg","width":300,"height":180,"filesize":20186,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/A-Virus-in-telegram-applicaiton-Recon-Cyber-Security-300x180.jpg"},"csco-thumbnail-uncropped":{"file":"A-Virus-in-telegram-applicaiton-Recon-Cyber-Security-380x678.jpg","width":380,"height":678,"filesize":57526,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/A-Virus-in-telegram-applicaiton-Recon-Cyber-Security-380x678.jpg"},"csco-medium":{"file":"A-Virus-in-telegram-applicaiton-Recon-Cyber-Security-800x500.jpg","width":800,"height":500,"filesize":70272,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/A-Virus-in-telegram-applicaiton-Recon-Cyber-Security-800x500.jpg"},"csco-medium-alternative":{"file":"A-Virus-in-telegram-applicaiton-Recon-Cyber-Security-560x336.jpg","width":560,"height":336,"filesize":40932,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/A-Virus-in-telegram-applicaiton-Recon-Cyber-Security-560x336.jpg"},"csco-medium-uncropped":{"file":"A-Virus-in-telegram-applicaiton-Recon-Cyber-Security-800x1427.jpg","width":800,"height":1427,"filesize":167247,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/A-Virus-in-telegram-applicaiton-Recon-Cyber-Security-800x1427.jpg"},"csco-large":{"file":"A-Virus-in-telegram-applicaiton-Recon-Cyber-Security-1160x680.jpg","width":1160,"height":680,"filesize":111866,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/A-Virus-in-telegram-applicaiton-Recon-Cyber-Security-1160x680.jpg"},"csco-large-uncropped":{"file":"A-Virus-in-telegram-applicaiton-Recon-Cyber-Security-1160x2070.jpg","width":1160,"height":2070,"filesize":292800,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/A-Virus-in-telegram-applicaiton-Recon-Cyber-Security-1160x2070.jpg"},"csco-extra-large":{"file":"A-Virus-in-telegram-applicaiton-Recon-Cyber-Security-1920x1024.jpg","width":1920,"height":1024,"filesize":214281,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/A-Virus-in-telegram-applicaiton-Recon-Cyber-Security-1920x1024.jpg"},"web-stories-poster-portrait":{"file":"A-Virus-in-telegram-applicaiton-Recon-Cyber-Security-640x853.jpg","width":640,"height":853,"filesize":97242,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/A-Virus-in-telegram-applicaiton-Recon-Cyber-Security-640x853.jpg"},"web-stories-publisher-logo":{"file":"A-Virus-in-telegram-applicaiton-Recon-Cyber-Security-96x96.jpg","width":96,"height":96,"filesize":10474,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/A-Virus-in-telegram-applicaiton-Recon-Cyber-Security-96x96.jpg"},"web-stories-thumbnail":{"file":"A-Virus-in-telegram-applicaiton-Recon-Cyber-Security-150x268.jpg","width":150,"height":268,"filesize":18704,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/A-Virus-in-telegram-applicaiton-Recon-Cyber-Security-150x268.jpg"},"full":{"file":"A-Virus-in-telegram-applicaiton-Recon-Cyber-Security-scaled.jpg","width":1435,"height":2560,"mimeType":"image\/jpeg","sourceUrl":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/A-Virus-in-telegram-applicaiton-Recon-Cyber-Security-scaled.jpg"}},"isPlaceholder":false,"isExternal":false,"needsProxy":false,"baseColor":"#22222b","blurHash":"UDA,5=nR^QSi_NI:RjR+GZX556jrtl=yIos.","creationDate":1722677880000,"src":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/A-Virus-in-telegram-applicaiton-Recon-Cyber-Security-scaled.jpg","id":11729,"alt":"A Virus in telegram applicaiton - Recon Cyber Security","local":false},"type":"image","x":0,"y":-60,"width":412,"height":732,"mask":{"type":"rectangle","showInLibrary":true,"name":"Rectangle","path":"M 0,0 1,0 1,1 0,1 0,0 Z","ratio":1,"supportsBorder":true},"id":"9fa5068c-8b40-424e-8b79-1ce86e8a00d5","isBackground":true,"isHidden":false},{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundTextMode":"NONE","font":{"family":"Roboto"},"fontSize":37,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"lineHeight":1.2,"textAlign":"left","padding":{"locked":true,"hasHiddenPadding":false,"horizontal":0,"vertical":0},"content":"<span style=\"color: #fff\">Unveiling the Vulnerability: How the Telegram Flaw Was Discovered<\/span>","x":48,"y":436,"width":316,"borderRadius":{"locked":true,"topLeft":2,"topRight":2,"bottomRight":2,"bottomLeft":2},"type":"text","height":177,"id":"be2a74c0-5f3e-4eb2-88ec-e6200238ec8c","marginOffset":1.0406249999999986,"link":{"needsProxy":false,"url":"https:\/\/reconcybersecurity.com\/blogs\/viral-videos-to-viruses-telegram-app-security-breach-explained-best-cyber-security-course-in-delhi\/","rel":[],"type":"regular","pageId":null,"icon":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/Viral-Videos-to-Viruses-Telegram-App-Security-Breach-Explained-Best-Cyber-Security-Course-in-Delhi.jpg","desc":"Viral Videos to Viruses: Telegram App Security Breach Explained | Best Cyber Security Course in Delhi"}}],"backgroundColor":{"color":{"r":255,"g":255,"b":255}},"id":"3eed3e92-a0a2-478b-9de8-dfc00743efaa","defaultBackgroundElement":{"opacity":100,"flip":{"vertical":false,"horizontal":false},"rotationAngle":0,"lockAspectRatio":true,"backgroundColor":{"color":{"r":196,"g":196,"b":196}},"x":1,"y":1,"width":1,"height":1,"mask":{"type":"rectangle"},"isBackground":true,"isDefaultBackground":true,"type":"shape","id":"fa7b8120-8c8a-4ea8-918d-b95431dbfba3"},"animations":[]}],"fonts":{"Roboto":{"family":"Roboto","weights":[100,300,400,500,700,900],"styles":["italic","regular"],"variants":[[0,100],[1,100],[0,300],[1,300],[0,400],[1,400],[0,500],[1,500],[0,700],[1,700],[0,900],[1,900]],"fallbacks":["Helvetica Neue","Helvetica","sans-serif"],"service":"fonts.google.com","metrics":{"upm":2048,"asc":1900,"des":-500,"tAsc":1536,"tDes":-512,"tLGap":102,"wAsc":1946,"wDes":512,"xH":1082,"capH":1456,"yMin":-555,"yMax":2163,"hAsc":1900,"hDes":-500,"lGap":0}}},"autoAdvance":true,"defaultPageDuration":10,"currentStoryStyles":{"colors":[]}},"story_poster":{"id":11733,"url":"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/08\/cropped-Viral-Videos-to-Viruses-Telegram-App-Security-Breach-Explained-Best-Cyber-Security-Course-in-Delhi.jpg","width":640,"height":853,"needsProxy":false},"_links":{"self":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/web-stories\/v1\/web-story\/11728","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/web-stories\/v1\/web-story"}],"about":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/types\/web-story"}],"author":[{"embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/web-stories\/v1\/users\/1"}],"version-history":[{"count":1,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/web-stories\/v1\/web-story\/11728\/revisions"}],"predecessor-version":[{"id":11734,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/web-stories\/v1\/web-story\/11728\/revisions\/11734"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/web-stories\/v1\/media\/11733"}],"wp:attachment":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/web-stories\/v1\/media?parent=11728"}],"wp:term":[{"taxonomy":"web_story_category","embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/web-stories\/v1\/web_story_category?post=11728"},{"taxonomy":"web_story_tag","embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/web-stories\/v1\/web_story_tag?post=11728"}],"wp:lock":[{"embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/web-stories\/v1\/web-story\/11728\/lock"}],"wp:publisherlogo":[{"embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/web-stories\/v1\/media\/11731"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}