Hackers have compromised 3CX, a popular videoconferencing and business phone management application used by more than 600,000 companies. Multiple cybersecurity providers, including CrowdStrike ...
The cybersecurity industry has scrambled in recent weeks to understand the origins and fallout of the breach of 3CX, a VoIP provider whose software was corrupted by North Korea–linked hackers in a ...
The desktop app from 3CX has been affected in the attack, which is being used by the threat actor to target 3CX customers, according to researchers from several cybersecurity vendors. A desktop ...
The unsettling supply chain attack on VoIP provider 3CX came to light on Wednesday, but it looks like the hackers behind the assault have been trying to infect 3CX users for weeks. The findings come ...
Turns out 3CX was not the original target in a recent supply chain compromise affecting customers of the video conferencing software maker: The attack came via a prior supply chain compromise ...
The supply chain attack on the 3CX voice-calling app has been traced back to a company employee installing a legitimate, but malware -laden program, onto their personal computer. The findings come ...
The hacking group responsible for the supply-chain attack targeting VoIP company 3CX also breached two critical infrastructure organizations in the energy sector and two financial trading ...
The communications app maker apologized to partners and customers and said that ‘we will do everything in our power to make up for this error.’ Communications app ...
A digitally signed and trojanized version of the 3CX Voice Over Internet Protocol (VOIP) desktop client is reportedly being used to target the company’s customers in an ongoing supply chain attack.
ESET researchers have discovered a new Lazarus Operation DreamJob campaign targeting Linux users. Operation DreamJob is the name for a series of campaigns where the group uses social engineering ...
The supply chain attack on the 3CX voice-calling app has been traced back to a company employee installing a legitimate, but malware-laden program, onto their personal computer. The findings come from ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results