Technology ❯ Cybersecurity ❯ Vulnerabilities ❯ Software Vulnerabilities
The company reports no evidence of UCCX exploitation to date.