<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1076912843267184&amp;ev=PageView&amp;noscript=1">
Webinars

Deconstructing 3CX: Red Flags, Misses and How to Address The Software Supply Chain Threat

Deconstructing 3CX: Red Flags, Misses and How to Address The Software Supply Chain Threat

Tomislav & Matt will cover the critical details resulting from analysis of the malicious files used in the attack and explore what pre-emptive actions could have been taken by 3CX to prevent this hack and mitigate future attacks following similar patterns.