Hackers have compromised 3CX, a popular videoconferencing and business phone management application used by more than 600,000 companies. Multiple cybersecurity providers, including CrowdStrike ...
The cybersecurity industry has scrambled in recent weeks to understand the origins and fallout of the breach of 3CX, a VoIP provider whose software was corrupted by North Korea–linked hackers in a ...
The hacking group responsible for the supply-chain attack targeting VoIP company 3CX also breached two critical infrastructure organizations in the energy sector and two financial trading ...
A digitally signed and trojanized version of the 3CX Voice Over Internet Protocol (VOIP) desktop client is reportedly being used to target the company’s customers in an ongoing supply chain attack.
ESET researchers have discovered a new Lazarus Operation DreamJob campaign targeting Linux users. Operation DreamJob is the name for a series of campaigns where the group uses social engineering ...
The threat actor — believed to be the Lazarus Group — that recently compromised 3CX's VoIP desktop application to distribute information-stealing software to the company's customers has also dropped a ...
The attack that injected malicious code into the company's software appears to have been enabled by another compromised application. At the end of March, an international VoIP software company called ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results