April 3, 2023, 1:07 p.m. | Zeljka Zorz

Help Net Security www.helpnetsecurity.com

Five days have passed since the supply chain attack targeting 3CX customers gained wider public attention, but the software’s manufacturer is yet to confirm how the Windows and macOS desktop apps (based on the Electron software framework) have been compromised by the attackers. 3CX has called in outside experts “On March 29th, 3CX received reports from a third party of a malicious actor exploiting a vulnerability in our product. We took immediate steps to investigate … More →


The post …

3cx actor apps attack attackers attention called compromised customers desktop don't miss electron enterprise experts exploiting fortinet framework government-backed attacks hot stuff macos malicious mandiant manufacturer march party product public reports software supply supply chain supply chain attack supply chain compromise targeting third trend micro video conferencing volexity vulnerability windows zscaler

More from www.helpnetsecurity.com / Help Net Security

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Principal Business Value Consultant

@ Palo Alto Networks | Chicago, IL, United States

Cybersecurity Specialist, Sr. (Container Hardening)

@ Rackner | San Antonio, TX

Penetration Testing Engineer- Remote United States

@ Stanley Black & Decker | Towson MD USA - 701 E Joppa Rd Bg 700

Internal Audit- Compliance & Legal Audit-Dallas-Associate

@ Goldman Sachs | Dallas, Texas, United States

Threat Responder

@ Deepwatch | Remote