If you use the 3CX desktop app for Windows or Mac, watch out: Hackers have hijacked the software to deliver malware to computers. On Wednesday, cybersecurity providers noticed malicious activity ...
The supply chain attack on the 3CX voice-calling app has been traced back to a company employee installing a legitimate, but malware-laden program, onto their personal computer. The findings come from ...
The desktop app from 3CX has been affected in the attack, which is being used by the threat actor to target 3CX customers, according to researchers from several cybersecurity vendors. A desktop ...
Hackers working on behalf of the North Korean government have pulled off a massive supply chain attack on Windows and macOS users of 3CX, a widely used voice and video calling desktop client, ...
Turns out 3CX was not the original target in a recent supply chain compromise affecting customers of the video conferencing software maker: The attack came via a prior supply chain compromise ...
There is so much wrong here. 3CX should not have blown this off as it got bigger, they should have looked into it. People using SentinelOne should have contacted them to find out what was going on.
An employee who downloaded an infected application onto their own PC is being blamed for last month’s compromise of the 3CX VoIP desktop client. In a report issued today, 3CX said the results of an ...
In response, 3CX CEO Nick Galea is urging users to uninstall the affected software, which includes versions 18.12.407 and 18.12.416 of the Windows app. The company is working on an update to fully ...