Hackers have compromised 3CX, a popular videoconferencing and business phone management application used by more than 600,000 companies. Multiple cybersecurity providers, including CrowdStrike ...
In response, 3CX CEO Nick Galea is urging users to uninstall the affected software, which includes versions 18.12.407 and 18.12.416 of the Windows app. The company is working on an update to fully ...
The hacking group responsible for the supply-chain attack targeting VoIP company 3CX also breached two critical infrastructure organizations in the energy sector and two financial trading ...
Turns out 3CX was not the original target in a recent supply chain compromise affecting customers of the video conferencing software maker: The attack came via a prior supply chain compromise ...
The supply chain attack on the 3CX voice-calling app has been traced back to a company employee installing a legitimate, but malware -laden program, onto their personal computer. The findings come ...
The threat actor — believed to be the Lazarus Group — that recently compromised 3CX's VoIP desktop application to distribute information-stealing software to the company's customers has also dropped a ...
The communications app maker apologized to partners and customers and said that ‘we will do everything in our power to make up for this error.’ Communications app ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results