The desktop app from 3CX has been affected in the attack, which is being used by the threat actor to target 3CX customers, according to researchers from several cybersecurity vendors. A desktop ...
A digitally signed and trojanized version of the 3CX Voice Over Internet Protocol (VOIP) desktop client is reportedly being used to target the company’s customers in an ongoing supply chain attack.
Atlanta, 20 January, 2009 – 3CX (https://www.3cx.com), the international developer of the multi-awarded 3CX Phone System for Windows, and Voxitas (www.voxitas.com), a leading business class VoIP ...
The communications app maker apologized to partners and customers and said that ‘we will do everything in our power to make up for this error.’ Communications app ...
The cybersecurity industry has scrambled in recent weeks to understand the origins and fallout of the breach of 3CX, a VoIP provider whose software was corrupted by North Korea–linked hackers in a ...
When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works. Cybersecurity researchers have warned of threat actors abusing a flaw in a VoIP solution used by ...
Software supply-chain attacks, in which hackers corrupt widely used applications to push their own code to thousands or even millions of machines, have become a scourge, both insidious and potentially ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results