


Major Companies Hit in Ongoing 3CX VoIP Supply Chain Attack
Major Companies Hit in Ongoing 3CX VoIP Supply Chain Attack Post Views: 35 Premium Content Subscribe to Patreon to watch this episode. Reading Time: 3 Minutes Compromised 3CX softphone app Hackers are using a trojanized version of the 3CX Voice Over Internet Protocol...
Attackers Could Exploit Flaw in WiFi Protocol to Hijack TCP Connections
Attackers Could Exploit Flaw in WiFi Protocol to Hijack TCP Connections Post Views: 200 Premium Content Subscribe to Patreon to watch this episode. Reading Time: 3 Minutes Vulnerability in the IEEE 802.11 WiFi protocol standard Cybersecurity researchers have found a...
MacStealer: The new info-stealing malware targeting Mac users
MacStealer: The new info-stealing malware targeting Mac users Post Views: 9 Premium Content Subscribe to Patreon to watch this episode. Reading Time: 3 Minutes New Mac malware steals credentials and sensitive data Security researchers have discovered a new malware...
Microsoft Uncovers Evidence of Russian Hackers Exploiting Outlook Vulnerability
Microsoft Uncovers Evidence of Russian Hackers Exploiting Outlook Vulnerability Post Views: 138 Premium Content Subscribe to Patreon to watch this episode. Reading Time: 3 Minutes Critical Flaw in Outlook Could Lead to Theft of NTLM Hashes Microsoft has issued...