{"id":3903,"date":"2023-03-31T08:11:59","date_gmt":"2023-03-31T07:11:59","guid":{"rendered":"https:\/\/werle.pro\/?p=3903"},"modified":"2023-03-31T08:13:08","modified_gmt":"2023-03-31T07:13:08","slug":"huntress-3cx-voip-software-compromise-supply-chain-threats","status":"publish","type":"post","link":"https:\/\/werle.pro\/index.php\/2023\/03\/31\/huntress-3cx-voip-software-compromise-supply-chain-threats\/","title":{"rendered":"Huntress &#8211; 3CX VoIP Software Compromise &amp; Supply Chain Threats"},"content":{"rendered":"\n<p>\u00ab\u00a0The 3CX VoIP Desktop Application has been compromised to deliver malware via legitimate 3CX updates. Huntress has been investigating this incident and working to validate and assess the current supply chain threat to the security community.\u00a0\u00bb<\/p>\n\n\n\n<p><a href=\"https:\/\/www.huntress.com\/blog\/3cx-voip-software-compromise-supply-chain-threats\">https:\/\/www.huntress.com\/blog\/3cx-voip-software-compromise-supply-chain-threats<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u00ab\u00a0The 3CX VoIP Desktop Application has been compromised to deliver malware via legitimate 3CX updates. Huntress has been investigating this incident and working to validate and assess the current supply chain threat to the security community.\u00a0\u00bb https:\/\/www.huntress.com\/blog\/3cx-voip-software-compromise-supply-chain-threats<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"categories":[10],"tags":[14,23],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p7ALXt-10X","jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/posts\/3903"}],"collection":[{"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/comments?post=3903"}],"version-history":[{"count":1,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/posts\/3903\/revisions"}],"predecessor-version":[{"id":3904,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/posts\/3903\/revisions\/3904"}],"wp:attachment":[{"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/media?parent=3903"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/categories?post=3903"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/tags?post=3903"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}