Investigating 3CX Desktop Application Attacks: What You Need to Know

This is a developing situation and this blog post will be updated as needed. Reports of malicious code associated with the 3CX desktop application – part of the 3CX VoIP (Voice over Internet Protocol) platform – began on March 22, 2023. On March 30, 2023, 3CX confirmed the compromise, noting the affected 3CX desktop app … ContinuedThe post Investigating 3CX Desktop Application Attacks: What You Need to Know appeared first on VMware Security Blog. More info: https://blogs.vmware.com/security/2023/03/investigating-3cx-desktop-application-attacks-what-you-need-to-know.html?utm_source=rss&utm_medium=rss&utm_campaign=investigating-3cx-desktop-application-attacks-what-you-need-to-know

Embedded vSphere Harbor default enablement results in an insecure configuration

This post is relevant to administrators that have enabled the embedded Harbor version in vSphere 7.0 or 8.0 as explained in Enable the Embedded Harbor Registry on the Supervisor Cluster. Harbor-helm issue Harbor when installed with harbor-helm will use a default key pair if no key pair is specified in core.secretName in values.yaml. This default … ContinuedThe post Embedded vSphere Harbor default enablement results in an insecure configuration appeared first on VMware Security Blog. More info: https://blogs.vmware.com/security/2023/03/embedded-vsphere-harbor-default-enablement-results-in-an-insecure-configuration.html?utm_source=rss&utm_medium=rss&utm_campaign=embedded-vsphere-harbor-default-enablement-results-in-an-insecure-configuration
Translate »