@arstechnica@geeknews.chat @adminkirsty Big banner about this on the Crowdstrike dash this morning. We're not a customer, so that particular headache avoided. Curious to learn how they got the adulterated package signed, although it made me think of CVE-2013-3900 which is not remediated by default on Windows
@adminkirsty @arstechnica@geeknews.chat @GossiTheDog @campuscodi thank you!
@sullybiker @arstechnica
@GossiTheDog and @campuscodi have a lot of info on #3CX. Suggest you head there for further discussion on the situation 😀