Technology

‘By replacing a legitimate update with a malicious one, they turned the product update flow into a malware distribution channel’: Experts find flaw in TrueConf video conferencing tool used by governments and military

Sophisticated supply chain attack exploited TrueConf update process Havoc framework implemented for espionage operations Vulnerability patched with…

‘By replacing a legitimate update with a malicious one, they turned the product update flow into a malware distribution channel’: Experts find flaw in TrueConf video conferencing tool used by governments and military Read More »