submitted by /u/Gallus [link] [comments] Go to Source of this post Author Of this post: /u/Gallus Post navigation The Defender’s Guide to the 3CX Supply Chain Attack – How it happened, why it matters, and what’s being done about it Developing a Robust Vulnerability Detection Tool for ink!