• Platform
    Platform
    • SDLC Inventory auto-discovery & analysis
    • security setting Security Posture Management
    • CI/CD Security
    • Data Bug Open-Source Malware Detection
    • Hardcoded Secrets Detection
    • Firewall Infrastructure as Code Security
    • Anomaly Detection
    • Continuous Compliance & SBOM
    Download Our Datasheet
    Download Solutions Datasheet
  • Use Cases
    Use Cases
    • Asset discovery, inventory and security posture classification
    • Prioritised and contextual threat management
    • Integrity and security of product releases
    • CI/CD Workflow Automation
    • Governance and compliance
    • Executive reporting and monitoring
    Download Our Datasheet
    Download Solutions Datasheet
  • Company
    • About
    • Events
    • Press & Media
    • Contact us
  • Resources
    Resources
    • Resource Library
    • Watch Video Demo
    • Xygeni Platform Datasheet
    • Webinars
    • Webinar ON DEMAND
    CI/CD Security From new attack tactics to protection strategies
    Securing the Software Supply Chain
    Watch Webinar
  • Blog
  • Login
  • Platform
    Platform
    • SDLC Inventory auto-discovery & analysis
    • security setting Security Posture Management
    • CI/CD Security
    • Data Bug Open-Source Malware Detection
    • Hardcoded Secrets Detection
    • Firewall Infrastructure as Code Security
    • Anomaly Detection
    • Continuous Compliance & SBOM
  • Use Cases
    Use Cases
    • Asset discovery, inventory and security
      posture classification
    • Prioritised and contextual threat
      management
    • Integrity and security of product releases
    • CI/CD Workflow Automation
    • Governance and compliance
    • Executive reporting and monitoring
  • Resources
    • Resource Library
    • Access Video Library
    • Xygeni Platform Datasheet
    • Webinars
  • Blog
  • Company
    • About
    • Events
    • Press & Media
    • Contact us
  • Login
  • Book a demo
  • Watch Demo Library
Watch Video Demo
Book a Demo

27 Apr 3CX Supply Chain Attack: Lessons Learned

Posted at 15:46h in Attacks, Attacks Analysis, build security, Software Supply Chain by Luis Rodríguez 0 Comments
Share

Software Supply Chain Attacks Analysis 3CX is a well-known company providing VoIP and Unified Communications products. They claim to have over 600,000 installations and 12M daily users. Undoubtedly a tempting target for bad actors. By the end of March 3CX was attacked in a sophisticated software supply...

Read More
Categories
  • Attacks
  • Attacks Analysis
  • build security
  • CI/CD Security
  • Code tampering
  • Misconfiguration
  • SDLC
  • Secrets leak
  • Software Supply Chain
  • Version-pinning
  • Webinars
Latest Posts
  • 3CX Supply Chain Attack: Lessons Learned
    27 April, 2023
  • 5 Essential Tips for Securing Your Software Supply Chain
    20 March, 2023
  • Agile and Security: Shaping New Landscapes in Software Supply Chains
    05 May, 2023
Tags
3CX Attacks Attacks Analysis Bad.build build security CI/CD CI/CD Security Code tampering cybersecurity google cloud bug Misconfiguration NSA NSA guidelines Secrets leak SLDC Software Supply chain sscs guidelines Supply chain Version-pinning webinars
Place your banner
Why are we here

Lorem ipsum dolor sit amet, conse ctetuer adipiscing elit, sed diami nonum nibhie vixtus euismod.

xygeni.logo.corregido_blanco

© 2023 Xygeni. All rights reserved

Linkedin-in Twitter

Platform

  • SDLC Inventory auto-discovery & analysis
  • Security Posture Management
  • CI/CD Security
  • Open-Source Malware Detection
  • Hardcoded Secrets Detection
  • Infrastructure as Code Security
  • Anomaly Detection
  • Continuous Compliance & SBOM

Use Cases

  • Asset discovery, inventory and security posture classification
  • Prioritised and contextual threat management
  • Integrity and security of product releases
  • CI/CD Workflow Automation
  • Governance and compliance
  • Executive reporting and monitoring

Resources

  • Blog
  • Xygeni Solution Datasheet
  • Watch Video Demo

Company

  • About
  • Events
  • Press & Media
  • ICE
  • Contact us

Legal

  • Privacy Policy
  • Cookie Policy
  • Legal Notice
  • Term of Use

join our Newsletter

Sign up for our newsletter and stay informed on the latest news in SSCS.