The desktop app from 3CX has been affected in the attack, which is being used by the threat actor to target 3CX customers, according to researchers from several cybersecurity vendors. A desktop ...
A digitally signed and trojanized version of the 3CX Voice Over Internet Protocol (VOIP) desktop client is reportedly being used to target the company’s customers in an ongoing supply chain attack.
Atlanta, 20 January, 2009 – 3CX (https://www.3cx.com), the international developer of the multi-awarded 3CX Phone System for Windows, and Voxitas (www.voxitas.com), a leading business class VoIP ...
The communications app maker apologized to partners and customers and said that ‘we will do everything in our power to make up for this error.’ Communications app ...
The cybersecurity industry has scrambled in recent weeks to understand the origins and fallout of the breach of 3CX, a VoIP provider whose software was corrupted by North Korea–linked hackers in a ...
Cybersecurity researchers have warned of threat actors abusing a flaw in a VoIP solution used by some of the world's biggest brands Multiple cybersecurity companies have rung the alarm on 3CX, ...
Multiple security firms have sounded the alarm about an active supply chain attack that’s using a trojanized version of 3CX’s widely used voice and video-calling client to target downstream customers.
Why you can trust TechRadar We spend hours testing every product or service we review, so you can be sure you're buying the best. Find out more about how we test. This review first appeared in issue ...
Update December 17, 15:30 EST: As shared today by 3CX CEO Nick Galea, the SQL injection flaw was discovered by independent security researcher Theo Stein in the 3CX CRM Integration and is now tracked ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results