
On Demand
Analyzing the 3CX Software Package
On Demand
In this first episode the 3CX software package and recent supply chain attack is analyzed using the ReversingLabs Software Supply Chain Security Platform. Tim deconstructs the 3CX software package, highlights critical red flags, and shows how you can apply these processes to your own secure build process.
Share this:
About the Series
In each episode of our application security series we will deconstruct, analyze, and expose hidden risks inside some of the largest most complex software packages. App Sec and Dev Teams will see our Software Supply Chain Security platform in action and how it provides teams with new found confidence and the ability to make Go/No Go software release decisions based on the most comprehensive view of software risk in the industry.

Related Episodes


Software Package Deconstruction: Enterprise VPN Comparison

Software Package Deconstruction: Uncover Software Vendor Risk

Software Package Deconstruction: Reducing False Positives in the SOC with Software Analysis

Software Package Deconstruction: OneDrive and Dropbox

Software Package Deconstruction: Supply Chain Analysis - Part 2: Code Signing Certificates

Software Package Deconstruction: Supply Chain Analysis - Part 1: Creating a Baseline

Software Package Deconstruction: Deconstructing Docker Desktop Software Package

Software Package Deconstruction: Deconstructing Crypto Wallet Software

Software Package Deconstruction: Deconstructing UPS Ship Manager

