![3CX](https://img.helpnetsecurity.com/wp-content/uploads/2023/03/30122613/3cx-trojanized-app-1000-400x200.jpg)
3CX customers targeted via trojanized desktop app
Suspected state-sponsored threat actors have trojanized the official Windows desktop app of the widely used 3CX softphone solution, a number of cybersecurity companies began …
![](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093354/mac-laptop-400x200.jpg)
Adapting the network for a remote working future
In the wake of the 2008 financial crisis, there was a big emphasis on stress testing major banks to determine if they have the reserves and processes to withstand such an …
![](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111158/voip-phone-400x200.jpg)
Why VoIP security is crucial for organizations
With more organizations turning to VoIP (Voice over Internet Protocol) and cloud-based Unified Communications (UC) systems to underpin their commercial services and corporate …
![phone](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194408/phone-400x200.jpg)
VoIP phones can be turned into spying or money-making tools
A security vulnerability present in many enterprise-grade VoIP phones can easily be exploited by hackers to spy on employees and management, says security consultant Paul …
Critical 0-days found in CPE WAN Management Protocol
Check Point has released its findings of security concerns in CPE WAN Management Protocol (CWMP/TR-069) deployments, used by major ISPs globally to control business and …
US bank customers targeted with vishing messages
Customers of a number of US banks have recently been hit by Voice over IP phishing (vishing) attacks orchestrated by eastern European cyber crooks, warns John LaCour, founder …
Unified Communications Forensics
“Unified Communications is the integration of real-time communication services such as instant messaging, presence information, telephony (including IP telephony), video …
In-house control and encrypted voice calls
Cellcrypt announced Cellcrypt Private Switch, a private network that allows an organization’s administrators complete privacy over user identity and calling activity. …
Poor Skype account verification allows account hijacking
A security researcher and hacker that does by the online handle of TibitXimer claims that his Skype account has been hijacked six times in one day due to Skype’s poor …
DDoS attacks aimed at telecom systems are on the rise
DDoS attacks are usually seen as the domain of hacktivists and hackers looking to block – then blackmail – companies that are heavily dependent on their Internet …
VolP: The new way in?
Voice is now data and as such it is a new attack vector for hackers into a company network. Most VoIP systems being deployed are based on Session Initiation Protocol (or SIP) …
Hiding messages in VoIP packets
A group of researchers from the Institute of Telecommunications of the Warsaw University of Technology have devised a relatively simple way of hiding information within VoIP …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD