Oct. 5, 2022, 9:04 p.m. | Steve Zurier

SC Magazine feed for Strategy www.scmagazine.com

Four British researchers discovered the vulnerabilities, two of which were critical and could allow a malicious server to read user messages and impersonate devices.

data security device security encryption end end-to-end matrix patches vulnerabilities vulnerability management

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Information Security Engineers

@ D. E. Shaw Research | New York City

Cybersecurity Triage Analyst

@ Peraton | Linthicum, MD, United States

Associate DevSecOps Engineer

@ LinQuest | Los Angeles, California, United States

DORA Compliance Program Manager

@ Resillion | Brussels, Belgium

Head of Workplace Risk and Compliance

@ Wise | London, United Kingdom