Chinese hackers have exploited a zero-day vulnerability in the TrueConf video conferencing software in attacks against government entities in Asia, Check Point reports.
The exploited bug, tracked as CVE-2026-3502 (CVSS score of 7.8), exists because the application does not properly verify updates before applying them.
This results in the execution of malicious code if an attacker could tamper with...
The strongest version of this narrative is that it exposes a critical vulnerability in trusted on-premises software, where the very mechanisms designed for security—internal servers and air-gapped systems—were weaponized against users. The attack demonstrates how threat actors exploit implicit trust in update processes, bypassing traditional perimeter defenses. The involvement of a Chinese threat actor, while plausible given historical patterns, remains an attribution that requires scrutiny, as ...
