March 15, 2022, 8:25 p.m. | SC Staff

SC Magazine feed for Risk Management www.scmagazine.com

Kerbit researchers discovered that threat actors could chain three security flaws in the Pascom Cloud Phone System to obtain complete pre-authenticated remote code execution.

cloud cloud security critical critical vulnerabilities phone remote access system vulnerabilities

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Information Security Engineers

@ D. E. Shaw Research | New York City

Cybersecurity Triage Analyst

@ Peraton | Linthicum, MD, United States

Associate DevSecOps Engineer

@ LinQuest | Los Angeles, California, United States

DORA Compliance Program Manager

@ Resillion | Brussels, Belgium

Head of Workplace Risk and Compliance

@ Wise | London, United Kingdom