Search results: VoIP security

Blue Box #85: Internet phone calls and terrorism, Georgia Tech report on Emerging Cyber Security Threats, phone jamming, 802.1X-REV, 802.1AE, VoIP security news and more

Synopsis: Blue Box #85: Internet phone calls and terrorism, Georgia Tech report on Emerging Cyber Security Threats, phone jamming, 802.1X-REV, 802.1AE, VoIP security news and more Welcome to Blue Box: The VoIP ...
 Body-VOIP-and-the-Security-Service-Edge

VOIP and the Security Service Edge

| | Blog, integrations
The cornerstone of a viable zero trust solution is that it must be able to successfully handle the wide variety of applications, both legacy and modern, that are being used within corporations ...
The State of Software Supply Chain Security 2024: Key takeaways

The State of Software Supply Chain Security 2024: Key takeaways

Software supply chain attacks are now mainstream events — a change in tactics by cyber-attackers that you can measure in headlines, which in recent years have delivered news about attacks on popular ...
The 443 Podcast - Episode 270 - Grading our 2023 Security Predictions

The Top 24 Security Predictions for 2024 (Part 1)

|
Where next for cyber in 2024? Here’s your annual roundup of cybersecurity forecasts, top cyber trends and cybersecurity industry prediction reports as we head into calendar year 2024 ...

Insider Threats in Cybersecurity: A Persistent Problem

| | Blog
Much of the discourse (and dollars) in cybersecurity focuses on creating stronger barriers against external malicious hackers. Firewalls, intrusion detection systems and robust encryption protocols all aim to shield companies against outside ...
SIP Connection Structure

VoIP Uncovered: A Guide to Services, Infrastructure Setup, and Reconnaissance

Voice over Internet Protocol (VoIP) has revolutionized voice communication by enabling calls over the Internet. It offers cost-effective solutions and is widely used in customer care services. In this first part of ...
The Week in Security: 3CX attack caused by earlier supply chain hack, malware in Google Play

The Week in Security: 3CX attack caused by earlier supply chain hack, malware in Google Play

Welcome to the latest edition of The Week in Security, which brings you the newest headlines from both the world and our team across the full stack of security: application security, cybersecurity, ...
Companies scramble to cover software supply chain security gaps: 3 key survey takeaways

Companies scramble to cover software supply chain security gaps: 3 key survey takeaways

|
The cyber risks posed by vulnerable internal, open-source and third-party software that make up a modern supply chain are a source of intense concern for both for development teams and security operations ...
The Week in Security: 3CX attackers identified as North Korean, CISA pushes Secure by Design

The Week in Security: 3CX attackers identified as North Korean, CISA pushes Secure by Design

Welcome to the latest edition of The Week in Security, which brings you the newest headlines from both the world and our team across the full stack of security: application security, cybersecurity, ...

3CX VoIP Desktop Application Supply Chain Attack

Threat Summary The 3CX DesktopApp is a voice and video conferencing software developed by 3CX – a widely used application, utilized by an estimated 600,000 companies. However, attackers potentially linked to North ...