Webinars

Deconstructing 3CX: Red Flags, Misses and How to Address The Software Supply Chain Threat

Deconstructing 3CX: Red Flags, Misses and How to Address The Software Supply Chain Threat

Tomislav & Matt will cover the critical details resulting from analysis of the malicious files used in the attack and explore what pre-emptive actions could have been taken by 3CX to prevent this hack and mitigate future attacks following similar patterns.