The desktop app from 3CX has been affected in the attack, which is being used by the threat actor to target 3CX customers, according to researchers from several cybersecurity vendors. A desktop ...
Turns out 3CX was not the original target in a recent supply chain compromise affecting customers of the video conferencing software maker: The attack came via a prior supply chain compromise ...
Security researchers are sounding the alarm on what may well be another major SolarWinds or Kaseya-like supply chain attack, this time involving Windows and Mac versions of a widely used video ...
Hackers working on behalf of the North Korean government have pulled off a massive supply chain attack on Windows and macOS users of 3CX, a widely used voice and video calling desktop client, ...
These days, our smartphones are more than just a way to watch videos on YouTube, or connect with friends. For a lot of us, they’re serious tools for us to keep in touch with people when we’re away ...
There is so much wrong here. 3CX should not have blown this off as it got bigger, they should have looked into it. People using SentinelOne should have contacted them to find out what was going on.