Blue Box #85: Internet phone calls and terrorism, Georgia Tech report on Emerging Cyber Security Threats, phone jamming, 802.1X-REV, 802.1AE, VoIP security news and more
Synopsis: Blue Box #85: Internet phone calls and terrorism, Georgia Tech report on Emerging Cyber Security Threats, phone jamming, 802.1X-REV, 802.1AE, VoIP security news and more Welcome to Blue Box: The VoIP ...
VOIP and the Security Service Edge
The cornerstone of a viable zero trust solution is that it must be able to successfully handle the wide variety of applications, both legacy and modern, that are being used within corporations ...
The State of Software Supply Chain Security 2024: Key takeaways
Software supply chain attacks are now mainstream events — a change in tactics by cyber-attackers that you can measure in headlines, which in recent years have delivered news about attacks on popular ...
The Top 24 Security Predictions for 2024 (Part 1)
Where next for cyber in 2024? Here’s your annual roundup of cybersecurity forecasts, top cyber trends and cybersecurity industry prediction reports as we head into calendar year 2024 ...
Insider Threats in Cybersecurity: A Persistent Problem
Much of the discourse (and dollars) in cybersecurity focuses on creating stronger barriers against external malicious hackers. Firewalls, intrusion detection systems and robust encryption protocols all aim to shield companies against outside ...
VoIP Uncovered: A Guide to Services, Infrastructure Setup, and Reconnaissance
Voice over Internet Protocol (VoIP) has revolutionized voice communication by enabling calls over the Internet. It offers cost-effective solutions and is widely used in customer care services. In this first part of ...
The Week in Security: 3CX attack caused by earlier supply chain hack, malware in Google Play
Welcome to the latest edition of The Week in Security, which brings you the newest headlines from both the world and our team across the full stack of security: application security, cybersecurity, ...
Companies scramble to cover software supply chain security gaps: 3 key survey takeaways
The cyber risks posed by vulnerable internal, open-source and third-party software that make up a modern supply chain are a source of intense concern for both for development teams and security operations ...
The Week in Security: 3CX attackers identified as North Korean, CISA pushes Secure by Design
Welcome to the latest edition of The Week in Security, which brings you the newest headlines from both the world and our team across the full stack of security: application security, cybersecurity, ...
3CX VoIP Desktop Application Supply Chain Attack
Threat Summary The 3CX DesktopApp is a voice and video conferencing software developed by 3CX – a widely used application, utilized by an estimated 600,000 companies. However, attackers potentially linked to North ...