From targeted toll fraud to deepfake scams, attackers exploit the gaps in VoIP security. The stakes include financial losses, data breaches and disruptions that can severely affect operations.
In the same vein, Joglekar said it is increasingly important to check a VoIP device's default security settings. In many cases, users get a phone, take it out of the box and start using it ...
disclosing that they’ve observed malicious activity originating from a trojanized version of the desktop VoIP app from 3CX. The attack has involved utilizing a code-signing certificate to ...