Suspected North Korean hackers compromised a futures trading app that was later installed on a 3CX employee's personal computer. The supply chain attack on the 3CX voice-calling app has been traced ...
Hackers working on behalf of the North Korean government have pulled off a massive supply chain attack on Windows and macOS users of 3CX, a widely used voice and video calling desktop client, ...
SentinelOne flagged 3CX software as malicious a week before the threat became fully public. The unsettling supply chain attack on VoIP provider 3CX came to light on Wednesday, but it looks like the ...
Hackers have compromised 3CX, a popular videoconferencing and business phone management application used by more than 600,000 companies. Multiple cybersecurity providers, including CrowdStrike ...
All customers that use 3CX’s phone system ‘will and should engage in a new risk assessment of this vendor based on what’s happened,’ Sophos’ Christopher Budd tells CRN. Following the supply chain ...
Customers of 3CX, a unified communications technology supplier, are being targeted by a North Korea-linked advanced persistent threat (APT) actor in a supply chain attack spreading via a compromised ...
While communications app maker 3CX has acknowledged it is responding to the compromise of its Windows VoIP app, Huntress’ John Hammond said it’s unclear if attackers may still be able to ‘poison ...
3CX will be releasing an update for the DesktopApp in the next few hours; meanwhile, users are urged to use the PWA Client instead. 3CX is working on a software update for its 3CX DesktopApp, after ...
The incident responders investigating how hackers carried out a complex supply-chain attack targeting enterprise phone provider 3CX say the company was compromised by another supply chain attack. 3CX, ...
ESET researchers have discovered a new Lazarus Operation DreamJob campaign targeting Linux users. Operation DreamJob is the name for a series of campaigns where the group uses social engineering ...
Google Cloud’s Mandiant says it has observed what appears to be the first ever instance of a double software supply chain attack, after uncovering evidence that suggests that the widespread 3CX ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results